Future of Information and Communication Conference (FICC) 2024
4-5 April 2024
Publication Links
IJACSA
Special Issues
Future of Information and Communication Conference (FICC)
Computing Conference
Intelligent Systems Conference (IntelliSys)
Future Technologies Conference (FTC)
International Journal of Advanced Computer Science and Applications(IJACSA), Volume 4 Issue 2, 2013.
Abstract: Wireless Sensor Networks (WSNs) are used in many applications in military, ecological, and health-related areas. These applications often include the monitoring of sensitive information such as enemy movement on the battlefield or the location of personnel in a building. Security is therefore important in WSNs. However, WSNs suffer from many constraints, including low computation capability, small memory, limited energy resources, susceptibility to physical capture, and the use of insecure wireless communication channels. These constraints make security in WSNs a challenge. In this article we discuss security issues in WSNs. In this paper we are discussing a vulnerable sinkhole attack, its implementation and correction.
Tejinderdeep Singh and Harpreet Kaur Arora, “Detection and Correction of Sinkhole Attack with Novel Method in WSN Using NS2 Tool” International Journal of Advanced Computer Science and Applications(IJACSA), 4(2), 2013. http://dx.doi.org/10.14569/IJACSA.2013.040205
@article{Singh2013,
title = {Detection and Correction of Sinkhole Attack with Novel Method in WSN Using NS2 Tool},
journal = {International Journal of Advanced Computer Science and Applications},
doi = {10.14569/IJACSA.2013.040205},
url = {http://dx.doi.org/10.14569/IJACSA.2013.040205},
year = {2013},
publisher = {The Science and Information Organization},
volume = {4},
number = {2},
author = {Tejinderdeep Singh and Harpreet Kaur Arora}
}
Copyright Statement: This is an open access article licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, even commercially as long as the original work is properly cited.