• Corpus ID: 13347628

Security Enhancement for the Wireless Sensor Networks

  title={Security Enhancement for the Wireless Sensor Networks},
  author={Dr. M. Anand Kumar},
This paper represents energy efficiency technique to find out the deception attack in wireless sensor network. NCS network provide many challenges to protect the packet delay and packet dropout. This methodology used to find out the attack and mitigate the effects and it improves the performance and protect from the damage. Protection against network attack consumes more energy. So the protection will be activated only when the attack persists in the network. In wireless network, deception… 

Tables from this paper


Detection and Prevention Techniques for Black hole Attack in Wireless Sensor Networks (WSN’s): A Review
The main focus will be on the detection and prevention techniques for black hole attack in WSNs.
Energy-Efficient Secure Routing Protocol Based on Roulette-Wheel and üTesla forWireless Sensor Networks.
An energy-efficient secure routing protocol for WSNs in which each sensor node forwards packets based on its own information so that it cannot be deceived by any other sensor node.
Increasing the performance of wireless sensor networks using IM-LEACH
This paper proposes an energy efficient clustering algorithm called IM-LEACH, which consists of two phases: Formation of clusters in the network and deciding the cluster heads schedule for the subsequent rounds.
BHAPSC: A New Black Hole Attack Prevention System in
This paper proposes and evaluates strategies to detecting black hole attacks and build reliable and secure inter cluster routing in wireless ad hoc networks.
An improved cluster head selection approach for energy efficiency in wireless sensor networks: A review
The proposed algorithm considers the sensor nodes residual energy to select optimal cluster head for next round of cluster head selection algorithm, which guarantees the entire network stays alive for longer time than the other existing energy efficient techniques.
Energy Management for Wireless Sensor Network Nodes
Based on the proposed model, the estimated lifetime of a battery powered sensor node can be increased significantly, given the wide range of applications that can benefit from such a technology.
Security Model for TCP/IP Protocol Suite
Some of the security flaws of IPv6 are identified and a new architecture for TCP/IP protocol suite is presented, which includes a layer called security layer, which guarantees security to Application layer using a protocol Application layer security protocol (ALSP).
Investigating the Efficiency of Blowfish and Rejindael (AES) Algorithms
This paper mainly focuses on two commonly used symmetric encryption algorithms such as Blowfish and Rejindael, which are compared and performance is evaluated.
Energy Efficient Routing Algorithm with sleep scheduling in Wireless Sensor Network
A novel approach for sleep scheduling of sensor nodes using a tree and an energy aware routing protocol which is integrated with the proposed sleep scheduling scheme.
Energy-efficient scheduling for wireless sensor networks
Focusing on large-scale networks with high total data rates, the analysis of the ILS reveals how its energy gain over traditional time-division multiple access depends on the channel and the data-length variations among different nodes.