K . S . Easwara Kumar

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
Wireless sensor networks are vulnerable to many types of security attacks, including false data injection, data forgery, and eavesdropping. Sensor nodes can be compromised by intruders, and the compromised nodes can distort data integrity by injecting false data. False data can be injected by compromised sensor nodes in various ways, including data(More)
Wireless sensor networks can be used to monitor environment in remote, unattended, and hostile environment. Nodes relay on limited power source without recharging. Therefore, one of the most important requirements of wireless sensor networks (WSN) is low power consumption. One way of achieving this is by node scheduling. That is schedule redundant nodes to(More)
  • 1