Soumettre la recherche
Mettre en ligne
Enhancing Data Transmission and Protection in Wireless Sensor Node- A Review
•
0 j'aime
•
42 vues
IRJET Journal
Suivre
https://www.irjet.net/archives/V3/i1/IRJET-V3I171.pdf
Lire moins
Lire la suite
Ingénierie
Signaler
Partager
Signaler
Partager
1 sur 3
Télécharger maintenant
Télécharger pour lire hors ligne
Recommandé
Secure data dissemination protocol in wireless sensor networks using xor netw...
Secure data dissemination protocol in wireless sensor networks using xor netw...
eSAT Publishing House
Wsn
Wsn
nishantshah2381
S04404116120
S04404116120
IJERA Editor
Presentation1
Presentation1
Rajat Soni
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
IRJET Journal
A-SURVEY SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORK
A-SURVEY SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORK
Editor IJMTER
Basic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor Network
Karthik
Bi33349355
Bi33349355
IJERA Editor
Recommandé
Secure data dissemination protocol in wireless sensor networks using xor netw...
Secure data dissemination protocol in wireless sensor networks using xor netw...
eSAT Publishing House
Wsn
Wsn
nishantshah2381
S04404116120
S04404116120
IJERA Editor
Presentation1
Presentation1
Rajat Soni
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
IRJET Journal
A-SURVEY SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORK
A-SURVEY SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORK
Editor IJMTER
Basic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor Network
Karthik
Bi33349355
Bi33349355
IJERA Editor
Introduction of Wireless Sensor Network
Introduction of Wireless Sensor Network
Muhammad Kaife Uddin
Prevention of Denial-of-Service Attack In Wireless Sensor Network via NS-2
Prevention of Denial-of-Service Attack In Wireless Sensor Network via NS-2
International Journal of Computer and Communication System Engineering
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET Journal
Data aggregation in wireless sensor network
Data aggregation in wireless sensor network
Shiwangi Thakur
I018135565
I018135565
IOSR Journals
Wsn ppt original
Wsn ppt original
Deepak Kumar Dhal
WSN presentation
WSN presentation
Braj Raj Singh
Review and Performance Comparison of Distributed Wireless Reprogramming Proto...
Review and Performance Comparison of Distributed Wireless Reprogramming Proto...
IOSR Journals
Threats in wireless sensor networks
Threats in wireless sensor networks
Priya Kaushal
Ijarcet vol-2-issue-3-933-937
Ijarcet vol-2-issue-3-933-937
Editor IJARCET
Secure Data Transmission
Secure Data Transmission
bjp4642
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET Journal
A044060107
A044060107
IJERA Editor
Some aspects of wireless sensor networks
Some aspects of wireless sensor networks
pijans
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKS
vtunotesbysree
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
Sigma web solutions pvt. ltd.
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
INFOGAIN PUBLICATION
Wireless sensor network wireless network
Wireless sensor network wireless network
Teced Ce
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...
DMV SAI
wireless sensor network a survey
wireless sensor network a survey
Thesis Scientist Private Limited
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
Editor IJMTER
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET Journal
Contenu connexe
Tendances
Introduction of Wireless Sensor Network
Introduction of Wireless Sensor Network
Muhammad Kaife Uddin
Prevention of Denial-of-Service Attack In Wireless Sensor Network via NS-2
Prevention of Denial-of-Service Attack In Wireless Sensor Network via NS-2
International Journal of Computer and Communication System Engineering
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET Journal
Data aggregation in wireless sensor network
Data aggregation in wireless sensor network
Shiwangi Thakur
I018135565
I018135565
IOSR Journals
Wsn ppt original
Wsn ppt original
Deepak Kumar Dhal
WSN presentation
WSN presentation
Braj Raj Singh
Review and Performance Comparison of Distributed Wireless Reprogramming Proto...
Review and Performance Comparison of Distributed Wireless Reprogramming Proto...
IOSR Journals
Threats in wireless sensor networks
Threats in wireless sensor networks
Priya Kaushal
Ijarcet vol-2-issue-3-933-937
Ijarcet vol-2-issue-3-933-937
Editor IJARCET
Secure Data Transmission
Secure Data Transmission
bjp4642
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET Journal
A044060107
A044060107
IJERA Editor
Some aspects of wireless sensor networks
Some aspects of wireless sensor networks
pijans
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKS
vtunotesbysree
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
Sigma web solutions pvt. ltd.
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
INFOGAIN PUBLICATION
Wireless sensor network wireless network
Wireless sensor network wireless network
Teced Ce
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...
DMV SAI
wireless sensor network a survey
wireless sensor network a survey
Thesis Scientist Private Limited
Tendances
(20)
Introduction of Wireless Sensor Network
Introduction of Wireless Sensor Network
Prevention of Denial-of-Service Attack In Wireless Sensor Network via NS-2
Prevention of Denial-of-Service Attack In Wireless Sensor Network via NS-2
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
Data aggregation in wireless sensor network
Data aggregation in wireless sensor network
I018135565
I018135565
Wsn ppt original
Wsn ppt original
WSN presentation
WSN presentation
Review and Performance Comparison of Distributed Wireless Reprogramming Proto...
Review and Performance Comparison of Distributed Wireless Reprogramming Proto...
Threats in wireless sensor networks
Threats in wireless sensor networks
Ijarcet vol-2-issue-3-933-937
Ijarcet vol-2-issue-3-933-937
Secure Data Transmission
Secure Data Transmission
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
A044060107
A044060107
Some aspects of wireless sensor networks
Some aspects of wireless sensor networks
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKS
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
Wireless sensor network wireless network
Wireless sensor network wireless network
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...
wireless sensor network a survey
wireless sensor network a survey
Similaire à Enhancing Data Transmission and Protection in Wireless Sensor Node- A Review
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
Editor IJMTER
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET Journal
2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...
EditorJST
Performance Evaluation of LEACH Protocol for Wireless Sensor Network
Performance Evaluation of LEACH Protocol for Wireless Sensor Network
AM Publications
AggreLEACH: Enhance Privacy Preserving in Wireless Sensor Network
AggreLEACH: Enhance Privacy Preserving in Wireless Sensor Network
ijsrd.com
Energy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A Review
theijes
J031101064069
J031101064069
theijes
IRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET Journal
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless N...
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless N...
IRJET Journal
Conservation Of Battery Power by Alleviating DOS Attacks in Wireless Sensor N...
Conservation Of Battery Power by Alleviating DOS Attacks in Wireless Sensor N...
IRJET Journal
Design Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor Networks
KhushbooGupta145
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...
IRJET Journal
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
IJERA Editor
A modified clustered based routing protocol to secure wireless sensor network...
A modified clustered based routing protocol to secure wireless sensor network...
eSAT Journals
Node Deployment Technique using Wireless Sensor Networks
Node Deployment Technique using Wireless Sensor Networks
IRJET Journal
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
pijans
Review on security issues of AODV routing protocol for MANETs
Review on security issues of AODV routing protocol for MANETs
IOSR Journals
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
IJERD Editor
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
IAEME Publication
Similaire à Enhancing Data Transmission and Protection in Wireless Sensor Node- A Review
(20)
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...
Performance Evaluation of LEACH Protocol for Wireless Sensor Network
Performance Evaluation of LEACH Protocol for Wireless Sensor Network
AggreLEACH: Enhance Privacy Preserving in Wireless Sensor Network
AggreLEACH: Enhance Privacy Preserving in Wireless Sensor Network
Energy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A Review
J031101064069
J031101064069
IRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor Network
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless N...
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless N...
Conservation Of Battery Power by Alleviating DOS Attacks in Wireless Sensor N...
Conservation Of Battery Power by Alleviating DOS Attacks in Wireless Sensor N...
Design Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor Networks
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
A modified clustered based routing protocol to secure wireless sensor network...
A modified clustered based routing protocol to secure wireless sensor network...
Node Deployment Technique using Wireless Sensor Networks
Node Deployment Technique using Wireless Sensor Networks
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
Review on security issues of AODV routing protocol for MANETs
Review on security issues of AODV routing protocol for MANETs
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
Plus de IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
Plus de IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Dernier
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
roncy bisnoi
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
SUHANI PANDEY
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
roncy bisnoi
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
M Maged Hegazy, LLM, MBA, CCP, P3O
NFPA 5000 2024 standard .
NFPA 5000 2024 standard .
DerechoLaboralIndivi
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
fenichawla
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
DineshKumar4165
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
RagavanV2
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
Asst.prof M.Gokilavani
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
rknatarajan
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
sivaprakash250
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
Asutosh Ranjan
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Dr.Costas Sachpazis
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Call Girls in Nagpur High Profile
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
mulugeta48
Thermal Engineering Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
DineshKumar4165
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
rknatarajan
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
Call Girls in Nagpur High Profile Call Girls
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
Dernier
(20)
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
NFPA 5000 2024 standard .
NFPA 5000 2024 standard .
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
Thermal Engineering Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
Enhancing Data Transmission and Protection in Wireless Sensor Node- A Review
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072 © 2015, IRJET ISO 9001:2008 Certified Journal Page 412 Enhancing Data Transmission and Protection in Wireless Sensor Node- A Review Prajwali wamanrao Gawande 1, Prof. Vijay Bagdi 2 1 Department of Computer Science and Engineering Abha Gaikwad Pati College of Engineering Nagpur, Maharashtra, India 2 Department of Computer Science and Engineering Abha Gaikwad Pati College of Engineering Nagpur, Maharashtra, India ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract-A wireless sensor network (WSN) have many different spatially distributed independent Sensors to observe physical or environmental conditions, such as sound, temperature, pressure, etc. and to pass their data to a main location through the network. Adittional Traffic is created with manegment requests and responses and the data issuing from the network’s actual sensing application. Sending and processing the data together, rather than individually can reduce the system’s energy. As the processing of data in WSN consumes more energy. So the data is being transmitted without processing it. By applying various cryptographic techniques we can transmit the data securely over WSN. In this paper we discuss the problem with wireless sensor network and have proposed the technique for increasing the efficiency of a node as well as for transmitting the data securely. Keyword: - WSN, RC-6, LEACH 1. INTRODUCTION Each sensor node has a constraint energy capacity in wireless sensor network, so energy-efficient mechanism is important. Sending packets from the source node to the destination node should be at highest priority than rather sensing the event. A typical node (Berkeley node) in [13] have a configuration of 8-bit CPU(4MHz), 128KB flash,4KB RAM and Transmission range of 100 Feet. The nodes in WSN are made of electronic devices that are able to sense, compute and transmit data from physical environments. These sensor nodes have limited energy resources. So, to extend the lifetime of network, energy resources for wireless sensor networks should be managed wisely. 1.1Efficiency of node:- In wireless communications, energy wastage shortens the networks lifetime. Following are the 4 reasons of energy wastage. 1) Collisions:- When two nodes transmit at the same time and interfere with each other. 2) Idle listening: - It happens when the radio is listening to the channel to receive a possible data that is not sent. 3) Overhearing: - When a sensor node receives packets that are not destined to it. This is the dominant factor of energy wastage, when traffic load is heavy and node density is high. 4) Control: - Packet overhead for protocols to exchange required information. Security: - Basically nature of WSN is to design low power, which forces security mechanisms to fit under very limiting processing and bandwidth constraints, so security to data has been the challenging issue. The security requirements in WSN are the authentication of entity, message, data, especially in data critical applications. It is observed in [12] that due to Sensor Node Constraints and Networking Constraints in WSN’s. Most of the protocols [13][14] are based on Symmetric key cryptography. 2. OVERVIEW OF EXISTING METHODS This section provides review of the existing techniques for important roving energy efficiency of node and provides security to data. Author in [1] has worked on improving the energy efficiency of the node. By considering some parameters. 2.1 By Reducing the Communication Costs Radio: In most wireless sensor network platforms, one of the key energy consumers is Communication. When the data is not been sent or receive. There are different medium access protocols that allow the radio chip to be put into a low power sleep mode (eg. BMAC, XMAC, and SMAC). Avoiding radio communication saves energy. The conclusions for this observation for a management system were discussed. 1) The management data was sent first, followed by the sensing data after a gap of four seconds. 2) Sending the management data and the sensing data together in a single packet
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072 © 2015, IRJET ISO 9001:2008 Certified Journal Page 413 2.2 Different Degrees of Co-operative Behavior: Either the management framework or the application has to wait for the next packet to be sent, if packets are to be shared between the sensor network application and the management framework. As decided that there should be no delay for messages sent by the application. In this paper [2] Author has focused that during idle listening energy wastage should be reduced. Toughest task is co-coordinating the awake schedule of both sender and receiver. They have designed Neighborhood-based Power Management (NPM), an energy-efficient hybrid MAC protocol that balances synchronization and signaling overhead. In which a sender knows exactly when a receiver is awake either through a priori knowledge of or by synchronizing the wakeup schedules. Thus, senders and receivers wake up at the same time, transmit their data, and then go back to sleep. 2.3 Signaling Mechanisms:- [2]All nodes in NPM periodically get active then they poll the channel for activity to receive incoming data messages. Due to the imperfect (out-of-date) synchronization information available to the nodes, NPM must use preambles before the actual data Messages, to signal the receivers that they must stay active until the data messages are received. In this paper [3] Author has worked on Security of data in WSN. Identity-based attacks are considered the first step in an intruder’s attempt to launch a variety of attacks, including denial of service (DOS), session hijacking, man- in-the-middle, data modification, and sniffing. Following are the two proposed techniques: Software-based fingerprinting:-Off-the-shelf wireless Devices and existing software ca be used for recording and extracting Software-based fingerprinting. Specifically, by putting the wireless card in monitor mode and using TCP dump or wire shark, all frames sent over the air can be sniffed. Therefore, the frame/beacon interval, frame size, and source and destination addresses of a frame can be easily obtained. Hardware-based fingerprinting:- It is the reflection of defects/unique design of the hardware on the transmitted wave forms. This signature scheme uses the inherent hardware imperfections and characteristics. It is hard to spoof the signature by using off-the shelf wireless devices. In this paper [4] DES algorithm has been used to encrypt and decrypt data. Fig1:-The symmetric data encryption/decryption algorithm has been widely used in networks. In fig 1:- Alice sends an encrypted message to Bob with a secret key. Bob may use the secret key to decipher the message. Because this message has been encrypted, even if the message is intercepted, the eavesdropper between Alice and Bob will not have the secret key to decipher the message [4]. In paper [5], author has introduced a scheme that could be used to achieve physical layer security against different attacks. They have classified the existing physical layer security methods into five major Categories: theoretical secure capacity, channel, coding, power, and signal detection approach. The security services in a WSN should protect the information transmitted over the public channels and the resources from attacks and misbehavior of nodes. They have proposed a protocol based on RSA. Tiny PK: Watro et al [11] has proposed Tiny PK security scheme. It is used to authenticate the user (external agent). It allows the sensor to share a session key with external agent. The infrastructure requirement for Tiny PK is CA, EA and WSN. CA is a trusted Certification Authority. It is an entity with public and private keys. CA is a trusted entity by all friendly units. EA is an External agent is an entity who tries to communicate with a sensor of WSN. Every node is loaded with CA public key while deploying into the network. 3. PROPOSED METHODOLOGY Hera we have proposed a methodology to increase efficiency of node and a technique to provide data security.
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072 © 2015, IRJET ISO 9001:2008 Certified Journal Page 414 LEACH Protocol has been used for increasing the Efficiency of node we are using a protocol ie.. LEACH is the earliest proposed single-hop clustering routing protocol in WSN; it can save network energy greatly compared with the non-cluster routing algorithm. In LEACH protocol, all clusters are self-organized, each cluster contains a cluster- head and several non-cluster head nodes, and cluster-head node consumes more energy than non-cluster head nodes. With the purpose of balancing network energy consumption and prolonging the network life cycle, it selects cluster head randomly and each node has an equal chance to be cluster-head [9]. Many other clustering algorithm are proposed based on LEACH, such as TEEN (Threshold Sensitive Energy Efficient Sensor Network Protocol)[6] ,PEGASIS(Power Efficient Gathering in Sensor Information Systems)[7] ,HEED(Hybrid Energy-Efficient Distributed Clustering)[8]. The cluster structure update constantly and a single updating process are called a round. Each round cycle consist two stages: set-up phase and steady-state phase, Set-up phase is the establishment phase of the cluster:- Each node generates a random number between 0 to 1, and compares this number with the threshold value T(n). If the number < T(n), the node is selected as a cluster-head, The threshold T(n0) is set as follow; Where n refers the node identification in the current sensor network; p is the percentage of cluster-heads; r is the current round number; G is the set of nodes that have not been elected as cluster-head in the last 1/p rounds. Steady-state phase is the stable data transfer phase, members of the cluster send data to the cluster-head in the way of single-hop during the allocated slot according to the TDMA table, the cluster-head receives all the data from each node in the cluster, fuses all the data into a single signal, then the fusion signal is transmitted to the base station by cluster-head. Data transmission lasts a certain time, and then the entire network comes into the next round. For Security of data in WSN:-We are using a symmetric key algorithm ie. RC6 (Rivest Cipher 6)[15] for security of data. RC6 is a symmetric key block cipher derived from RC5.RC6 has a block size of 128 bits and supports key sizes of 128, 192, and 256 bits. Encryption and Decryption Operation.:- RC6 works with four w-bit registers A,B,C,D which contain the initial input plaintext as well as the output cipher text at the end of encryption. The first byte of plaintext or cipher text is placed in the least-significant byte of A; the last byte of plaintext or cipher text is placed into the most-significant byte of D. We use (A;B;C;D) = (B;C;D;A) to mean the parallel assignment of values on the right to registers on the left. 4. CONCLUSION Hence we have studied various energy efficiency techniques and have also proposed the protocol which is used to improve efficiency of node. We have proposed an algorithm ie. RC6 (Rivest Cipher 6) to transmit the data securely over WSN, which has a key size of 128 bits. Thus the proposed technique is an effective and secure approach to improve efficiency of node.
Télécharger maintenant