Please use this identifier to cite or link to this item:
http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/5280
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Mishra, Balmukund | - |
dc.contributor.author | Singh, Yashwant [Guided by] | - |
dc.date.accessioned | 2022-07-28T11:55:22Z | - |
dc.date.available | 2022-07-28T11:55:22Z | - |
dc.date.issued | 2015 | - |
dc.identifier.uri | http://ir.juit.ac.in:8080/jspui//xmlui/handle/123456789/5280 | - |
dc.description.abstract | Wireless Sensor Networks (WSN) are practiced in many real life applications such as military, weather forecasting, medical, target spotting and tracking, etc. The sensor nodes are spread over the target area for the accumulation of data. The collected data further transmitted from one sensor node to other sensor node. WSN nodes have limited resources like energy, memory and processing capabilities. Efficient utilization of these resources is challenging task in WSN. MAC layer of wireless sensor nodes plays a vital role in WSN because most of the power is depleted at this layer due to collision in medium access and node synchronization. We have given a comparative analysis of all the existing WSN MAC protocol. The comparison is done on the basis of various parameters such as energy consumption, end to end latency, scalability, security from the outside attacker. Analysis of these MAC protocols will serve us in selection of a MAC protocol for a particular WSN application. As well as second part of my project is node clone detection. Node clone in wireless sensor network is very dangerous issue because nodes are deployed in hostile environment where it is not possible to physically go and protect the system and node. So nodes deployed in hostile environment can easily captured and compromised by intruders and all the confidential and personal data been extracted from node. However, they require too strong assumptions to be practical for large-scale, randomly deployed sensor networks. In this project work we will give a novel approach for node clone detection that will takes very less communication messages for detection of node clone and revocation. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Jaypee University of Information Technology, Solan, H.P. | en_US |
dc.subject | Wireless sensor networks | en_US |
dc.subject | MAC protocols | en_US |
dc.subject | Node clone detection | en_US |
dc.subject | WSNs | en_US |
dc.title | Comparative Analysis of WSN MAC Protocols and Node Clone Attack | en_US |
dc.type | Project Report | en_US |
Appears in Collections: | Dissertations (M.Tech.) |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Comparative Analysis of WSN MAC Protocols and Node Clone Attack.pdf | 971.86 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.