Loading

Fake Data Termination in Wireless Sensor Networks
M.S. Pavithraa1, C.Balakrishnan2

1Ms. M. S. Pavithraa, M.E Student, Department of Engineering, S.A. Engineering College, Chennai (Tamil Nadu), India.
2Mr. C. Balakrishnan, M.E (Ph.D.) Assistant Professor, Department of Engineering, S.A. Engineering College, Chennai (Tamil Nadu), India.

Manuscript received on 18 June 2012 | Revised Manuscript received on 25 June 2012 | Manuscript published on 30 June 2012 | PP: 1-4 | Volume-1 Issue-2, June 2012 | Retrieval Number: A0157041212/2012©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Wireless sensor networks are specified ad-hoc networks. They are characterized by their limited computing power and energy constraints because they are generally limited in memory, power and computational ability. Thus they can only transmit data to a limited distance. The major challenges of wireless sensor networks are security. This paper proposes a study of security in this kind of network. Here a list of attacks with their specificities and vulnerabilities are presented. Based on the location information presence of fake data can be identified. Here a solution to terminate this fake information is discussed.
Keywords: Ad-hoc Networks, Sensor Networks, attacks, security.

Scope of the Article: Sensor Cloud and Mobile Cloud