Enhancement of Security in Wireless Sensor Network by Using Trust Evaluation and TCP/IP Based Technology
DOI:
https://doi.org/10.55524/Keywords:
Wireless Sensor Network, Hacker, TCP/IP, Port, Socket, CryptographyAbstract
Today Wireless network technology are widely used technology in many organizations. Wireless LANs transmit and receive data without physical channel means over the air so no need for a wired connection. For this radio frequency (RF) technology is used. Without any cables attached, a wireless network allows devices to remain linked to the network. The main advantage of wireless network is that it is typically cheaper, simpler, quicker to set up as wireless network does not require expensive wiring. Mainly radio communication is used to implement wireless communication networks. At physical level of OSI model network structure this implementation takes place. Examples of wireless networks include cell phone networks, Wi-Fi local networks & terrestrial microwave networks. The advent of wireless sensor network has given birth to new kinds of routing algorithms and new security threats.
Downloads
References
C.Siva Ram Murthy and B.Smanoj, “ Ad Hoc Wireless Networks – Architectures and Protocols”, Pearson Education, 2004.
Feng Zhao and Leonidas Guibas, “Wireless Sensor Networks”, Morgan Kaufman Publishers, 2004.
C.K.Toh, “Ad Hoc Mobile Wireless Networks”, Pearson
Thomas Krag and Sebastin Buettrich, “Wireless Mesh Networking”, O’Reilly Publishers, 2007.
Agi, I., Gong, L.: An empirical study of secure mpeg video transmissions. In: Proceedings of the Symposium on Network and Distributed System Security, pp. 137–144. IEEE Press, New York (1996)
Baugher, M., McGrew, D., Naslund, M., Carrara, E., Norrman, K.: The secure real-time trans-port protocol (SRTP) (2004)
Bergeron, C., Lamy-Bergot, C.: Complaint selective encryption for h.264/avc video streams. In: IEEE 7th
Workshop on Multimedia Signal Processing, pp. 1–4 (2005). doi: 10.1109/ MMSP.2005.248641
Cheng, H., Li, X.: Partial encryption of compressed images and videos. IEEE Trans. Signal Process. 48(8), 2439–2451 (2000). doi: 10.1109/78.852023
Chiaraluce, F., Ciccarelli, L., Gambi, E., Pierleoni, P., Reginelli, M.: A new chaotic algorithm for video encryption. IEEE Trans. Consum. Electron. 48(4), 838–844 (2002)
Li, S., Zheng, X., Mou, X., Cai, Y.: Chaotic encryption scheme for real-time digital video. In: Real-Time Imaging VI. Proceedings of SPIE, vol. 4666, pp. 149–160 (2002)
Lian, S., Liu, Z., Ren, Z., Wang, H.: Secure advanced video coding based on selective encryp-tion algorithms. IEEE Trans. Consum. Electron. 52(2), 621–629 (2006)
Lian, S., Liu, Z., Ren, Z., Wang, H.: Commutative encryption and watermarking in video compression. IEEE Trans. Circuits Syst. Video Technol. 17(6), 774–778 (2007)
Logik Bomb: Hacker's Encyclopedia (1997)