Advanced Security Mechanism in Wireless Sensor Network Using Watchdog and SAFEQ Mechanism
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064


Amazon Sale


Research Paper | Computer Science & Engineering | India | Volume 3 Issue 12, December 2014

Advanced Security Mechanism in Wireless Sensor Network Using Watchdog and SAFEQ Mechanism

Gajendra Singh, Monali V. Ghode

In Wireless Sensor Networks, where twotier architecture is used; the storage nodes hold the data collected bysensors acting as mediator between sink and sensors. This will help in efficient query processing in WSN. However, in reality the storage nodes are the center of attraction to attackers. Recently Chen and Liu proposed a protocol that will protect the WSN and support privacy preserving range queries. This protocol uses a novel technique for encoding data, queries and results in such a way that the whole communication is secured. In this paper we implemented a custom simulator which demonstrates the proof of concept. The empirical results revealed that the proposed security approach is effective.

Keywords: wireless sensor network, integrity, privacy, security, SafeQ

Edition: Volume 3 Issue 12, December 2014

Pages: 1981 - 1983

Share this Article

How to Cite this Article?

Gajendra Singh, Monali V. Ghode, "Advanced Security Mechanism in Wireless Sensor Network Using Watchdog and SAFEQ Mechanism", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=18121409, Volume 3 Issue 12, December 2014, 1981 - 1983

69 PDF Views | 44 PDF Downloads

Download Article PDF


Amazon Sale


Similar Articles with Keyword 'wireless sensor network'

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1838 - 1842

Predicting and Extending of Sensor Lifetime in Wireless Sensor Networks using Fuzzy Logic

Pawan Kumar, Manoj Challa

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2294 - 2298

Effective Approach for Localizing Jammers in Wireless Sensor Network

Ashwini S. Chimankar, V. S. Nandedkar

Share this Article

Similar Articles with Keyword 'integrity'

Review Papers, Computer Science & Engineering, India, Volume 9 Issue 10, October 2020

Pages: 1251 - 1256

IT Auditing and its Standards

Dr D S Kushwaha, Ankur Singh

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1981 - 1983

Advanced Security Mechanism in Wireless Sensor Network Using Watchdog and SAFEQ Mechanism

Gajendra Singh, Monali V. Ghode

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 1940 - 1944

Dynamic Routing for Data Integrity and Delay Differentiated Services in Wireless Sensor Networks

Dr. Mohammed Abdul Waheed, Heena Khanum

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 2097 - 2100

Prototype of Computing Device That Aims to Secure User Data on a Compromised OS

Pavan Kulkarni, Aditi Halgekar, Avantika Dhavale, Mehak Daftari, Snehal Wayse

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1058 - 1060

Data Integrity Proof in Cloud Computing using TPA with Privacy Preserving

Rushikesh P. Dhanokar

Share this Article

Similar Articles with Keyword 'privacy'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2267 - 2274

Two Accounts of Solitude in Online Communal Networks

Alla Venu Gopal, G. Srinivasa Reddy

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 1330 - 1335

Efficient Image Encryption EIE - Compression System Using Haar Wavelets Using Matlab

Kavita, Anil Vadhwa

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1486 - 1489

Mobile Based Marketing System Using Privacy and Security Aware Location Based Rewarding System

Digvijay A. Patil, Yogesh B. Gurav

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 1028 - 1031

Secure and Efficient Item Information Retrieval in Cloud Computing

Dr. Shameem Akther, Tahseen Begum

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1724 - 1727

Privacy Preserving Authenticity Framework for Shared Data Cloud Network

P. Vanitha Sree, K. Narayana Rao

Share this Article

Similar Articles with Keyword 'security'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 1330 - 1335

Efficient Image Encryption EIE - Compression System Using Haar Wavelets Using Matlab

Kavita, Anil Vadhwa

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1486 - 1489

Mobile Based Marketing System Using Privacy and Security Aware Location Based Rewarding System

Digvijay A. Patil, Yogesh B. Gurav

Share this Article

Similar Articles with Keyword 'SafeQ'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1981 - 1983

Advanced Security Mechanism in Wireless Sensor Network Using Watchdog and SAFEQ Mechanism

Gajendra Singh, Monali V. Ghode

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 6, June 2013

Pages: 152 - 155

Maintaining Privacy and Integrity of Range Queries in Wireless Sensor Networks

R. Swathi, A. L. Sreenivasulu

Share this Article
Top