Volume : 6, Issue : 8, August - 2017
Transpersonal Leadership: An insinuating tool for organization effectiveness
Dr. Vijit Chaturvedi
Abstract :
<p> <span style="font-size: 10pt; line-height: 115%; font-family: "Times New Roman", serif;">The Wireless Sensor Network built of nodes from very few to several hundred or even thousands and each node connects with one or more sensors. During transmitting the date among these nodes and sensors, security is the main concern for the WSNs. </span><span style="font-size: 10pt; line-height: 115%; font-family: "Times New Roman", serif; color: rgb(51, 51, 51); background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;">A Sensor responds and detects some type of input from both the physical or environmental conditions, such as pressure, heat, light, etc. To protect from such kind of situations Cryptography is one option. Cryptography can applied with symmetric key techniques, asymmetric keytechniques and hash function. Selection of appropriate lightweight cryptographic technique is much important due to the constraint like computing, communication and battery power over the WSNs.</span></p>
Keywords :
Article:
Download PDF Journal DOI : 10.15373/2249555XCite This Article:
Viralkumar B. Polishwala, P. H. Bhathawala, Kamljit Lakhtaria, Wireless Sensor Networks: Security Attacks and Challenges, GLOBAL JOURNAL FOR RESEARCH ANALYSIS : VOLUME-6, ISSUE-8, AUGUST-2017