alexa Data Reporting in Wireless Sensor Network Using a Dynamic en-routing Scheme to Ensure Privacy | Abstract
ISSN ONLINE(2319-8753)PRINT(2347-6710)

International Journal of Innovative Research in Science, Engineering and Technology
Open Access

Like us on: https://twitter.com/ijirset_r
OMICS International organises 3000+ Global Conferenceseries Events every year across USA, Europe & Asia with support from 1000 more scientific Societies and Publishes 700+ Open Access Journals which contains over 50000 eminent personalities, reputed scientists as editorial board members.

Open Access Journals gaining more Readers and Citations

700 Journals and 15,000,000 Readers Each Journal is getting 25,000+ Readers

This Readership is 10 times more when compared to other Subscription Journals (Source: Google Analytics)

Research Article Open Access

Abstract

Wireless sensor networking is an rising technology, which potentially supports many Emerging applications for both civilian and military purpose. Node compromise is the major and uniquesecurity issues in sensor network. These compromised nodes could report false sensed resultsand degrade the reliability of the whole network. The secure network protocol of MoteSecawareonly provide security against DoS attack with AES and to detect the replay and jamming attacksbased on synchronized incremental counter approach. But the false report injection attacks willnot be detected in MoteSec aware. The false report injection is one of the critical threats inwireless sensor network. Sometimes it may destroy the scheme is used. The scheme each nodehas a hash chain of authentication keys used to endorse reports mean while a legitimate reportshould be authenticated by a certain number of nodes. Wireless whole network. Filter the falsereport injection attacks and to prevent dos attacks dynamic en-route filtering sensor networkingis an rising technology, which potentially supports many emerging applications Finally we proveour scheme efficient than existing work in terms of energy consumption and communicationoverhead also provide security by early detection of false reports

To read the full article Peer-reviewed Article PDF image | Peer-reviewed Full Article image

Author(s): G.Karthiga, C.preethi, R.DelshiHowsalya Devi

Share This Page

Additional Info

Loading
Loading Please wait..
 
 
Peer Reviewed Journals
 
Make the best use of Scientific Research and information from our 700 + peer reviewed, Open Access Journals
International Conferences 2017-18
 
Meet Inspiring Speakers and Experts at our 3000+ Global Annual Meetings

Contact Us

 
© 2008-2017 OMICS International - Open Access Publisher. Best viewed in Mozilla Firefox | Google Chrome | Above IE 7.0 version
adwords