2015
DOI: 10.1007/978-81-322-2523-2_6
|View full text |Cite
|
Sign up to set email alerts
|

An Enhanced Security Pattern for Wireless Sensor Network

Abstract: Numerous schemes for data aggregation are done by encryption for privacy of data, and thus, homomorphism has been reviewed and designed on the wireless sensor network (WSN) to improve security. WSN is an emerging and challenging technology in the area of the research because of its vital scope with low power energy associated with it. Several application sensors collect information or data from different sensed nodes and will be aggregated to a host computer or a base station. Data aggregation happens in a net… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 13 publications
0
3
0
Order By: Relevance
“…This is gained by controlling the traffic of attack and mechanism of pushback. Vinu Das [10] proposed the honey pot on the basis of the distribution detection of attack from different sources of attack by using the traditional system of honey pot [11] and distributed consumption for enhancing the overall protection of system area. The system identifies the attacking behavior by the database feature invasion, which could be compatible with the snorting feature of library, and detecting the recent invasion features by real-time up-gradation.…”
Section: Related Workmentioning
confidence: 99%
“…This is gained by controlling the traffic of attack and mechanism of pushback. Vinu Das [10] proposed the honey pot on the basis of the distribution detection of attack from different sources of attack by using the traditional system of honey pot [11] and distributed consumption for enhancing the overall protection of system area. The system identifies the attacking behavior by the database feature invasion, which could be compatible with the snorting feature of library, and detecting the recent invasion features by real-time up-gradation.…”
Section: Related Workmentioning
confidence: 99%
“…Apart from the usual operations that any sensor node has, such as, sensing, processing, and routing, security can be termed as a top-up for enhanced features. 5,6 This research mainly focuses on the use of WSNs in such hazardous areas, such as battlefield, fire zone, and so on, where security and energy efficiency are the issues of major concern. In a battlefield, various types of sensor nodes can be deployed like soldier trackers and acoustic sensors to monitor the approach of enemy while securing the parameters.…”
Section: Introductionmentioning
confidence: 99%
“…Apart from the usual operations that any sensor node has, such as, sensing, processing, and routing, security can be termed as a top-up for enhanced features. 5,6…”
Section: Introductionmentioning
confidence: 99%