Secure Routing in Wireless Sensor Networks using WEAP Protocol


Wireless sensor networks are usually deployed for gathering data from unattended or hostile environment. Many sensor network routing protocols have been proposed, but they are very defenseless to security threats. Due to limitations of sensor devices, the networks are susceptible to hackers, it is possible for one to enter and render a network. In this… (More)

7 Figures and Tables


  • Presentations referencing similar topics