Downloads: 115 | Views: 255
Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 12, December 2014 | Popularity: 6.8 / 10
Wireless Sensor Network and its Security - A Survey
M. Ravi, P. Subramaniam
Abstract: A wireless sensor network (WSN) has vital applications such as remote environmental monitoring and target tracking. This has been assisted by the availability, particularly in recent years, of sensors that are smaller, cheaper, and intelligent. These sensors are furnished with wireless interfaces with which they can communicate with one another to form a network. The design of a WSN depends significantly on the application, and it must consider factors such as the environment, the applications design objectives, cost, hardware, and system constraints. The goal of our survey is to present a comprehensive review of the Wireless Sensor Network and its various types. A survey mainly focusing the security methods helps to protecting the data from the unauthorised users, Following the WSN security methods, we give an overview of several new WSN applications.
Keywords: Wireless Sensor Network, Sensor network types, network security, WSN application
Edition: Volume 3 Issue 12, December 2014
Pages: 2727 - 2733
Make Sure to Disable the Pop-Up Blocker of Web Browser
Downloads: 656 | Views: 2002
Computer Science & Engineering, India, Volume 9 Issue 7, July 2020
Pages: 1454 - 1458Heart Disease Prediction with Machine Learning Approaches
Megha Kamboj
Downloads: 401 | Views: 719
Computer Science & Engineering, India, Volume 7 Issue 11, November 2018
Pages: 1951 - 1955Hadoop Performance Improvement using Metadata and Securing with Oauth Token
Swapnali A. Salunkhe, Amol B. Rajmane
Downloads: 386 | Views: 699
Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 1 - 3Comparative Study of Conventional Desktop Computer and Compute Stick
Aadarsh Sooraj, Sooraj G.
Downloads: 354 | Views: 698
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 629 - 632Review Paper on Secure Hashing Algorithm and Its Variants
Priyanka Vadhera, Bhumika Lall
Downloads: 336 | Views: 688
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2148 - 2152The Impact and Application of 3D Printing Technology
Thabiso Peter Mpofu, Cephas Mawere, Macdonald Mukosera