Mobility

Biased and Secured Time Synchronized Protocol for Wireless Sensor Networks

Download Now Free registration required

Executive Summary

In a wireless sensor network a large number of sensors are deployed for the purpose of sensing and bring the data back securely to nearby base stations. The base stations then perform the costly computation on behalf of the sensors to analyze the data sensed by the sensors. Due to resource limitations of the nodes and also due to the vulnerability of physical captures of the nodes, the traditional cryptographic techniques are Complex and should not fit for energy constrained environments. Data mining techniques can be applied to find the malicious behavior of the nodes of the sensor network. By analyzing the traffic patterns one can differentiate the normal behavior from malicious behavior.

  • Format: PDF
  • Size: 498.22 KB