IJSTE

CALL FOR PAPERS : Apr-2024

Submission Last Date
25-Apr-24
Submit Manuscript Online

FOR AUTHORS

FOR REVIEWERS

ARCHIEVES

DOWNLOADS

Open Access



CopyScape
Creative Commons License

An Analysis of Secure Communications and Depletion Attacks in Wireless Sensor Networks


Author(s):

Anjumol T Many , MAR BASELIOS CHRISTIAN COLLEGE OF ENGINEERING AND TECHNOLOGY,PEERMADE,IDUKKI,PIN:685531; Dr. P. P Joby, MAR BASELIOS CHRISTIAN COLLEGE COLLEGE OF ENGINEERING AND TECHNOLOGY

Keywords:

Ghost, ZigBee, IoT

Abstract:

In wireless sensor networks, ZigBee has been recognized as an enabling technique for Internet of Things (IoT). It will make the network susceptible to a variety of security threats. Nowadays, as sensing, communication, control becomes even more sophisticated. There are some methods to solve like how IoT could change the world in distant future is first presented, Hybrid MAC protocol for Heterogeneous M2M networks, Challenges to vehicle-to-vehicle or vehicle-to-internet infrastructure connectivity, Construction of an “alphabet set”: a set of signature packet size used for Esense communication for dynamic sensing and routing (DoSR) an optimization algorithm is used. And the extensive simulation to show the impact of the ghost, it will investigates attacks on ZigBee. Nowadays, a solution to the ghost is more important. Through this we can improve the security of ZigBee further.


Other Details:

Manuscript Id :IJSTEV3I5010
Published in :Volume : 3, Issue : 5
Publication Date: 01/12/2016
Page(s): 265-267
Download Article

IMPACT FACTOR

4.753

NEWS & UPDATES

Submit Article

Dear Authors, You can submit your article to our journal at the following link: http://www.ijste.org/Submit

Impact Factor

The Impact Factor of our Journal is 4.753 (Year - 2016)
3.905 (Year - 2015) 2.895(Year -2014)

Click Here

Submit Payment Online

Dear Authors, Now you can submit the payment receipt to our journal online at the following link: index.php?p=Payment

1

1

GLOBAL INDEXING



















Computer Science Directory. We are listed under Computer Research Institutes category

Share on Social media

Home | Privacy Policy | Terms & Conditions | Refund Policy | Feedback | Contact Us
Copyright © 2014 ijste.org All rights reserved