Enhancement of Security in Wireless Sensor Network by Using Trust Evaluation and TCP/IP Based Technology

Authors

  • Rahul Das Research Scholar, Department of Computer Science, Mansarovar Global University, Billkisganj, Sehore, Madhya Pradesh, India Author
  • Mona Dwivedi Professor, Department of Computer Science, Mansarovar Global University, Billkisganj, Sehore, Madhya Pradesh, India Author

DOI:

https://doi.org/10.55524/

Keywords:

Wireless Sensor Network, Hacker, TCP/IP, Port, Socket, Cryptography

Abstract

Today Wireless network technology are  widely used technology in many organizations. Wireless  LANs transmit and receive data without physical channel  means over the air so no need for a wired connection. For this  radio frequency (RF) technology is used. Without any cables  attached, a wireless network allows devices to remain linked  to the network. The main advantage of wireless network is  that it is typically cheaper, simpler, quicker to set up as  wireless network does not require expensive wiring. Mainly radio communication is used to implement wireless  communication networks. At physical level of OSI model  network structure this implementation takes place.  Examples of wireless networks include cell phone  networks, Wi-Fi local networks & terrestrial microwave  networks. The advent of wireless sensor network has given  birth to new kinds of routing algorithms and new security  threats. 

Downloads

Download data is not yet available.

References

C.Siva Ram Murthy and B.Smanoj, “ Ad Hoc Wireless Networks – Architectures and Protocols”, Pearson Education, 2004.

Feng Zhao and Leonidas Guibas, “Wireless Sensor Networks”, Morgan Kaufman Publishers, 2004.

C.K.Toh, “Ad Hoc Mobile Wireless Networks”, Pearson

Thomas Krag and Sebastin Buettrich, “Wireless Mesh Networking”, O’Reilly Publishers, 2007.

Agi, I., Gong, L.: An empirical study of secure mpeg video transmissions. In: Proceedings of the Symposium on Network and Distributed System Security, pp. 137–144. IEEE Press, New York (1996)

Baugher, M., McGrew, D., Naslund, M., Carrara, E., Norrman, K.: The secure real-time trans-port protocol (SRTP) (2004)

Bergeron, C., Lamy-Bergot, C.: Complaint selective encryption for h.264/avc video streams. In: IEEE 7th

Workshop on Multimedia Signal Processing, pp. 1–4 (2005). doi: 10.1109/ MMSP.2005.248641

Cheng, H., Li, X.: Partial encryption of compressed images and videos. IEEE Trans. Signal Process. 48(8), 2439–2451 (2000). doi: 10.1109/78.852023

Chiaraluce, F., Ciccarelli, L., Gambi, E., Pierleoni, P., Reginelli, M.: A new chaotic algorithm for video encryption. IEEE Trans. Consum. Electron. 48(4), 838–844 (2002)

Li, S., Zheng, X., Mou, X., Cai, Y.: Chaotic encryption scheme for real-time digital video. In: Real-Time Imaging VI. Proceedings of SPIE, vol. 4666, pp. 149–160 (2002)

Lian, S., Liu, Z., Ren, Z., Wang, H.: Secure advanced video coding based on selective encryp-tion algorithms. IEEE Trans. Consum. Electron. 52(2), 621–629 (2006)

Lian, S., Liu, Z., Ren, Z., Wang, H.: Commutative encryption and watermarking in video compression. IEEE Trans. Circuits Syst. Video Technol. 17(6), 774–778 (2007)

Logik Bomb: Hacker's Encyclopedia (1997)

Downloads

Published

2022-01-30

How to Cite

Enhancement of Security in Wireless Sensor Network by Using Trust Evaluation and TCP/IP Based Technology . (2022). International Journal of Innovative Research in Computer Science & Technology, 10(1), 79–82. https://doi.org/10.55524/