alexa A Novel Security Issues Analysis and Evaluation of Secu
ISSN ONLINE(2320-9801) PRINT (2320-9798)

International Journal of Innovative Research in Computer and Communication Engineering
Open Access

OMICS International organises 3000+ Global Conferenceseries Events every year across USA, Europe & Asia with support from 1000 more scientific Societies and Publishes 700+ Open Access Journals which contains over 50000 eminent personalities, reputed scientists as editorial board members.

Open Access Journals gaining more Readers and Citations

700 Journals and 15,000,000 Readers Each Journal is getting 25,000+ Readers

This Readership is 10 times more when compared to other Subscription Journals (Source: Google Analytics)

Research Article

A Novel Security Issues Analysis and Evaluation of Security Method in WSNs

To read the full article Peer-reviewed Article PDF image


Wireless Sensor Networks (WSNs) are used in many applications in army, environmental, and healthcare related trust areas. These applications often include the monitoring of sensitive information such as enemy movement on the battlefield or the location of personnel in a building. Security is therefore important in WSNs. However, WSNs suffer from many constraints, including low computation capability, small memory, limited energy resources, susceptibility to physical capture, and the use of insecure wireless communication channels. These constraints make security in WSNs a challenge. WSNs are often organized in challenging atmospheres where a competitor can substantially confinement some of the nodes, first can reprogram, and then, can duplicate them in a large number of emulations, easily taking control over the network. A few disseminated solutions have been recently proposed, but they are not adequate. First, they are energy and memory arduous: A serious drawback for any protocol to be used in the WSN resource constrained environment. First, we investigate the necessary properties of a dispersed mechanism for the detection of node reproduction spasms. Second, we show that the known resolutions for this problem do not finally meet our necessities. We proposed a new self-curative, randomized, efficient, and distributed protocol for the recognition of node duplication attacks, and we show that it gratifies the established requirements.


Share This Page

Additional Info

Loading Please wait..
Peer Reviewed Journals
Make the best use of Scientific Research and information from our 700 + peer reviewed, Open Access Journals
International Conferences 2017-18
Meet Inspiring Speakers and Experts at our 3000+ Global Annual Meetings

Contact Us

© 2008-2017 OMICS International - Open Access Publisher. Best viewed in Mozilla Firefox | Google Chrome | Above IE 7.0 version