Volume : 6, Issue : 8, August - 2017

Transpersonal Leadership: An insinuating tool for organization effectiveness

Dr. Vijit Chaturvedi

Abstract :

<p>&nbsp;<span style="font-size: 10pt; line-height: 115%; font-family: &quot;Times New Roman&quot;, serif;">The Wireless Sensor Network built of nodes from very few to several hundred or even thousands and each node connects with one or more sensors. During transmitting the date among these nodes and sensors, security is the main concern for the WSNs. </span><span style="font-size: 10pt; line-height: 115%; font-family: &quot;Times New Roman&quot;, serif; color: rgb(51, 51, 51); background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;">A Sensor responds and detects some type of input from both the physical or environmental conditions, such as pressure, heat, light, etc. To protect from such kind of situations Cryptography is one option. Cryptography can applied with symmetric key techniques, asymmetric keytechniques and hash function. Selection of appropriate lightweight cryptographic technique is much important due to the constraint like computing, communication and battery power over the WSNs.</span></p>

Keywords :


Cite This Article:

Viralkumar B. Polishwala, P. H. Bhathawala, Kamljit Lakhtaria, Wireless Sensor Networks: Security Attacks and Challenges, GLOBAL JOURNAL FOR RESEARCH ANALYSIS : VOLUME-6, ISSUE-8, AUGUST-2017


Article No. : 1


Number of Downloads : 1


References :