A Study of Various Algorithms Used for Analyzing Eavesdropping Attack in Industrial Wireless Sensor Network

Abstract

In industrial applications, the real time communications among the spatially distributed sensors should satisfy reliability requirements and strict security. Most of the industries use wireless networks for communicating information and data, due to high cable cost. Since the wireless networks are insecure, it is essential to secure the critical information and data during transmission. The data that transmitted is intercepted by eavesdropper can be predicted by secrecy capacity. When the secrecy capacity gets fades, then it is known that transmitted data is intercepted. In the event of applying optimal sensor scheduling scheme a sensor with highest secrecy capacity is choosen and the data is transmitted. In this paper various types of scheduling are studied.

Authors and Affiliations

Dr. K. A. Dattatreya, R. Sindhuja

Keywords

Related Articles

DDoS Services Attacks In Mobile Ad-hoc Network

In vision of the growing demand for wireless information and data services, it is very important to providing faster and reliable mobile access to users. Today's, not only mobile phones, but also laptops and PDAs are us...

Performance and Experimental Studies on VortexCirculating Bed Solar Dryer

Numerous types of solar dryers have been designed and developed in various part of the world. Various topics in sun and solar drying are discussed in many scientific reports, research manuscripts and books. This researc...

Static Load Balancing Using ASA Max-Min Algorithm

In recent times, a huge demand for computational resources has led to the development of large network known as a Grid [1]. A grid allows resources to be acquired in real time on an on-demand basis making sophisticated...

A Sustainable Design for Shaft Straightening Process using Hydraulic Jack

This paper deals with improvements in shaft straighteners. It is particularly for straightening the shafts used in the submersible pumps which become bent in service. It has been found that the shafts of submersible pum...

Numerical Analysis and Optimization of Passenger Car Drive Shaft

The main objective of the drive shaft is reduction of weight of passenger car. Drive shaft is one of the most important parts of the vehicle which transfers the motion from gear box to the rear wheel of the vehicle. The...

Download PDF file
  • EP ID EP23167
  • DOI http://doi.org/10.22214/ijraset.2017.2078
  • Views 287
  • Downloads 6

How To Cite

Dr. K. A. Dattatreya, R. Sindhuja (2017). A Study of Various Algorithms Used for Analyzing Eavesdropping Attack in Industrial Wireless Sensor Network. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 5(2), -. https://www.europub.co.uk/articles/-A-23167