TAXONOMY FOR WSN SECURITY-A SURVEY
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2013, Vol 4, Issue 2
Abstract
WSN is one of the dominant and emerging technology that shows great promise for various application in military, ecological and health related areas.WSN is highly vulnerable to attacks and inclusion of wireless communication technology incurs various types of security threats.WSN requires security measures due to sensitive data and as sensor may operate in hostile unattended environment.WSN suffer from constraints like low computational capability, small memory limited energy resources physical capture susceptibility and insecure wireless communication channel. These create security a challenge in WSN. In this article we provide a survey of security in WSN.We provide an outline with constraints and security requirement and attacks with their counter measures in WSN.
Authors and Affiliations
Kshitija Ajabrao Chaple
A tool for prototyping a precision GPS system
The GPS allows locating an object in any part of the World with a certain degree of accuracy. Some precision activities need to operate with a sub-metric level of accuracy. This paper introduces a data analysis tool to p...
OPTIMIZATION OF CHANNEL ALLOCATION ALGORITHM FOR HOT SPOT CELLS IN WIRELESS NETWORKS
Dense deployment of cellular networks is leading to scarcity of communication bandwidth or what we call as channel. If compared to its wired counterparts, wireless cellular network have limited number of channels availab...
A Survey of Mining Association Rules Using Constraints
As we all know that association rule is used to find out the rules that are associated with the items present in the database that satisfy user specified support and confidence. There are many algorithms for mining assoc...
Robust Singular Value Decomposition Algorithm for Unique Faces
It has been read and also seen by physical encounters that there found to be seven near resembling humans by appearance .Many a times one becomes confused with respect to identification of such near resembling faces wh...
Congestion Control in Computer Networks with a New Hybrid Intelligent Algorithm
With invention of computer networks, transferring data from one computer to another became possible, but as the number of computers that transfer data to each other increased and common communication channel bandwidth am...