ISSN 2278-9723
 

Technical Note 


SECURITY THREATS AND AUTHENTICATION APPROACHES IN WIRELESS SENSOR NETWORKS

R.SUDHAKAR, RAJAKUMARI.J, POORNIMA.S, RAMYA.V.

Abstract
Wireless sensor network are used for the replacement of wired networks and it communication is much faster
compared to wired networks. The conducted simulation results and corresponding analysis demonstrate the
proposed algorithms state of art schemes in terms of detection accuracy and effectiveness. Authentication key
establishment protocols between a sensor and a security manager in a self-organizing sensor networks.WSN are
produces the various types of attacks such as (Sybil, Wormhole, Sinkhole, Selective forwarding attack ) It uses the low
battery power and low in energy. Hackers can hack the data while in sending from one system to another. The
malicious detection is mainly used the protocol of (STC-OLSR)to find the shortest path algorithm. It compare the cost
with neighbor nodes to find the least difference to delivers the packets from source to destination in it.

Key words: Wireless Sensor Networks, Detection Accuracy, Attacks


 
ARTICLE TOOLS
Abstract
PDF Fulltext
Print this article Print this Article
How to cite this articleHow to cite this article
Citation Tools
Related Records
 Articles by R.SUDHAKAR
Articles by RAJAKUMARI.J
Articles by POORNIMA.S
Articles by RAMYA.V
on Google
on Google Scholar
Article Statistics
 Viewed: 239
Downloaded: 3
Cited: 0


How to Cite this Article
Pubmed Style

, RAJAKUMARI.J , POORNIMA.S , RAMYA.V . SECURITY THREATS AND AUTHENTICATION APPROACHES IN WIRELESS SENSOR NETWORKS. . 2019; 7(2): 1-3. doi:10.31838/ijccts/07.02.01


Web Style

, RAJAKUMARI.J , POORNIMA.S , RAMYA.V . SECURITY THREATS AND AUTHENTICATION APPROACHES IN WIRELESS SENSOR NETWORKS. http://www.ijccts.org/?mno=302644248 [Access: August 26, 2019]. doi:10.31838/ijccts/07.02.01


AMA (American Medical Association) Style

, RAJAKUMARI.J , POORNIMA.S , RAMYA.V . SECURITY THREATS AND AUTHENTICATION APPROACHES IN WIRELESS SENSOR NETWORKS. . 2019; 7(2): 1-3. doi:10.31838/ijccts/07.02.01



Vancouver/ICMJE Style

, RAJAKUMARI.J , POORNIMA.S , RAMYA.V . SECURITY THREATS AND AUTHENTICATION APPROACHES IN WIRELESS SENSOR NETWORKS. . (2019), [cited August 26, 2019]; 7(2): 1-3. doi:10.31838/ijccts/07.02.01



Harvard Style

, RAJAKUMARI.J, ., POORNIMA.S, . & RAMYA.V, . (2019) SECURITY THREATS AND AUTHENTICATION APPROACHES IN WIRELESS SENSOR NETWORKS. , 7 (2), 1-3. doi:10.31838/ijccts/07.02.01



Turabian Style

, RAJAKUMARI.J, POORNIMA.S, and RAMYA.V. 2019. SECURITY THREATS AND AUTHENTICATION APPROACHES IN WIRELESS SENSOR NETWORKS. International Journal of Communication and Computer Technologies, 7 (2), 1-3. doi:10.31838/ijccts/07.02.01



Chicago Style

, RAJAKUMARI.J, POORNIMA.S, and RAMYA.V. "SECURITY THREATS AND AUTHENTICATION APPROACHES IN WIRELESS SENSOR NETWORKS." International Journal of Communication and Computer Technologies 7 (2019), 1-3. doi:10.31838/ijccts/07.02.01



MLA (The Modern Language Association) Style

, RAJAKUMARI.J, POORNIMA.S, and RAMYA.V. "SECURITY THREATS AND AUTHENTICATION APPROACHES IN WIRELESS SENSOR NETWORKS." International Journal of Communication and Computer Technologies 7.2 (2019), 1-3. Print. doi:10.31838/ijccts/07.02.01



APA (American Psychological Association) Style

, RAJAKUMARI.J, ., POORNIMA.S, . & RAMYA.V, . (2019) SECURITY THREATS AND AUTHENTICATION APPROACHES IN WIRELESS SENSOR NETWORKS. International Journal of Communication and Computer Technologies, 7 (2), 1-3. doi:10.31838/ijccts/07.02.01