Learn More
Wireless Sensor Networks consists of tiny devices capable of processing, routing the sensed data and are capable of detecting the intruders. The process of detecting any suspected(anomalous) moving object(attacker) within the reach of a Wireless Sensor Network area is referred to as intrusion detection. In this paper, we propose an algorithm to detect the(More)
Wireless Sensor Networks consists of tiny devices which processes and routes the sensed data. The process of detecting any external and internal intruders entering to a Wireless Sensor Network area is referred to as intrusion detection. An intruder is a moving attacker entering a particular area. In this paper, we propose an algorithm Secure and Energy(More)
Wireless Sensor Networks consists of sensor nodes that are capable of sensing the information and maintaining security. In this paper, an Anonymity Cluster based Trust Management algorithm(ACTM) is proposed which enhances the security level and provides a stable path for communication. It is observed that the performance of the network is better than(More)
This paper presents, a Group Based Optimal Retransmission Medium Access (GORMA) Protocol is designed, that combines protocol of Collision Avoidance (CA) and energy management for low-cost, short-range, low-data rate and lowenergy sensor nodes applications in environment monitoring, agriculture, industrial plants etc. In this paper, the GORMA protocol(More)
Wireless Sensor Networks(WSNs) are composed of tiny devices with limited computation and energy capacities. Data fusion is an essential technique to achieve power efficiency in sensor nodes. Some nodes misbehave by increasing the defer time which obstruct the data fusion process. In this paper, an efficient Secured Quality of Service(QoS)-Aware Data(More)
Secure Transmission of data packets in Wireless Sensor Networks is an important area of Research. There is a possibility of an attacker creating security holes in the network. Hence, network security and reliability can be achieved by discovering random multiple paths using multiple domains, and forwarding data packets from the source node to the(More)
  • 1