Security Enhancement for the Wireless Sensor Networks
@inproceedings{Kumar2017SecurityEF, title={Security Enhancement for the Wireless Sensor Networks}, author={Dr. M. Anand Kumar}, year={2017} }
This paper represents energy efficiency technique to find out the deception attack in wireless sensor network. NCS network provide many challenges to protect the packet delay and packet dropout. This methodology used to find out the attack and mitigate the effects and it improves the performance and protect from the damage. Protection against network attack consumes more energy. So the protection will be activated only when the attack persists in the network. In wireless network, deception…
References
SHOWING 1-10 OF 18 REFERENCES
Detection and Prevention Techniques for Black hole Attack in Wireless Sensor Networks (WSN’s): A Review
- Computer Science
- 2014
The main focus will be on the detection and prevention techniques for black hole attack in WSNs.
Energy-Efficient Secure Routing Protocol Based on Roulette-Wheel and üTesla forWireless Sensor Networks.
- Computer Science
- 2012
An energy-efficient secure routing protocol for WSNs in which each sensor node forwards packets based on its own information so that it cannot be deceived by any other sensor node.
Increasing the performance of wireless sensor networks using IM-LEACH
- Computer Science
- 2015
This paper proposes an energy efficient clustering algorithm called IM-LEACH, which consists of two phases: Formation of clusters in the network and deciding the cluster heads schedule for the subsequent rounds.
BHAPSC: A New Black Hole Attack Prevention System in
- Computer Science
- 2012
This paper proposes and evaluates strategies to detecting black hole attacks and build reliable and secure inter cluster routing in wireless ad hoc networks.
An improved cluster head selection approach for energy efficiency in wireless sensor networks: A review
- Computer Science2015 International Conference on Pervasive Computing (ICPC)
- 2015
The proposed algorithm considers the sensor nodes residual energy to select optimal cluster head for next round of cluster head selection algorithm, which guarantees the entire network stays alive for longer time than the other existing energy efficient techniques.
Energy Management for Wireless Sensor Network Nodes
- Computer Science
- 2011
Based on the proposed model, the estimated lifetime of a battery powered sensor node can be increased significantly, given the wide range of applications that can benefit from such a technology.
Security Model for TCP/IP Protocol Suite
- Computer Science
- 2011
Some of the security flaws of IPv6 are identified and a new architecture for TCP/IP protocol suite is presented, which includes a layer called security layer, which guarantees security to Application layer using a protocol Application layer security protocol (ALSP).
Investigating the Efficiency of Blowfish and Rejindael (AES) Algorithms
- Computer Science
- 2012
This paper mainly focuses on two commonly used symmetric encryption algorithms such as Blowfish and Rejindael, which are compared and performance is evaluated.
Energy Efficient Routing Algorithm with sleep scheduling in Wireless Sensor Network
- Computer Science
- 2012
A novel approach for sleep scheduling of sensor nodes using a tree and an energy aware routing protocol which is integrated with the proposed sleep scheduling scheme.
Energy-efficient scheduling for wireless sensor networks
- Computer ScienceIEEE Transactions on Communications
- 2005
Focusing on large-scale networks with high total data rates, the analysis of the ILS reveals how its energy gain over traditional time-division multiple access depends on the channel and the data-length variations among different nodes.