Please use this identifier to cite or link to this item: http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/5280
Full metadata record
DC FieldValueLanguage
dc.contributor.authorMishra, Balmukund-
dc.contributor.authorSingh, Yashwant [Guided by]-
dc.date.accessioned2022-07-28T11:55:22Z-
dc.date.available2022-07-28T11:55:22Z-
dc.date.issued2015-
dc.identifier.urihttp://ir.juit.ac.in:8080/jspui//xmlui/handle/123456789/5280-
dc.description.abstractWireless Sensor Networks (WSN) are practiced in many real life applications such as military, weather forecasting, medical, target spotting and tracking, etc. The sensor nodes are spread over the target area for the accumulation of data. The collected data further transmitted from one sensor node to other sensor node. WSN nodes have limited resources like energy, memory and processing capabilities. Efficient utilization of these resources is challenging task in WSN. MAC layer of wireless sensor nodes plays a vital role in WSN because most of the power is depleted at this layer due to collision in medium access and node synchronization. We have given a comparative analysis of all the existing WSN MAC protocol. The comparison is done on the basis of various parameters such as energy consumption, end to end latency, scalability, security from the outside attacker. Analysis of these MAC protocols will serve us in selection of a MAC protocol for a particular WSN application. As well as second part of my project is node clone detection. Node clone in wireless sensor network is very dangerous issue because nodes are deployed in hostile environment where it is not possible to physically go and protect the system and node. So nodes deployed in hostile environment can easily captured and compromised by intruders and all the confidential and personal data been extracted from node. However, they require too strong assumptions to be practical for large-scale, randomly deployed sensor networks. In this project work we will give a novel approach for node clone detection that will takes very less communication messages for detection of node clone and revocation.en_US
dc.language.isoenen_US
dc.publisherJaypee University of Information Technology, Solan, H.P.en_US
dc.subjectWireless sensor networksen_US
dc.subjectMAC protocolsen_US
dc.subjectNode clone detectionen_US
dc.subjectWSNsen_US
dc.titleComparative Analysis of WSN MAC Protocols and Node Clone Attacken_US
dc.typeProject Reporten_US
Appears in Collections:Dissertations (M.Tech.)

Files in This Item:
File Description SizeFormat 
Comparative Analysis of WSN MAC Protocols and Node Clone Attack.pdf971.86 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.