Secure Routing in Wireless Sensor Networks using WEAP Protocol

Abstract

Wireless sensor networks are usually deployed for gathering data from unattended or hostile environment. Many sensor network routing protocols have been proposed, but they are very defenseless to security threats. Due to limitations of sensor devices, the networks are susceptible to hackers, it is possible for one to enter and render a network. In this… (More)

7 Figures and Tables

Topics

  • Presentations referencing similar topics