Design and Implementation of Tarf for WSNs
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Downloads: 110 | Weekly Hits: ⮙4 | Monthly Hits: ⮙9

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 3 Issue 9, September 2014

Design and Implementation of Tarf for WSNs

Kavita, Amareshwari Patil

A wireless sensor network is a collection of nodes organized into a cooperative network. Wireless sensor networks (WSNs) have gained worldwide attention in recent years, particularly with the proliferation in Micro-Electro-Mechanical Systems (MEMS) technology which has facilitated the development of smart sensors. Multi-hop routing in wireless sensor networks (WSNs) offers little protection against deception through replaying routing information. This defect can be taken advantage of by an adversary to misdirect significant network traffic, resulting in disastrous consequences. It cannot be solved solely by encryption or authentication techniques. To secure multi-hop routing in WSNs against intruders exploiting the replay of routing information, we propose TARF, a trust aware routing framework for WSNs.

Keywords: Wireless sensor network, Multi-hop routing, Encryption, Energy efficient Scalability & Adaptability

Edition: Volume 3 Issue 9, September 2014

Pages: 1944 - 1947

Share this Article

How to Cite this Article?

Kavita, Amareshwari Patil, "Design and Implementation of Tarf for WSNs", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SEP14504, Volume 3 Issue 9, September 2014, 1944 - 1947

Enter Your Registered Email Address





Similar Articles with Keyword 'Wireless sensor network'

Downloads: 152 | Weekly Hits: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Downloads: 9 | Weekly Hits: ⮙8 | Monthly Hits: ⮙9

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021

Pages: 1169 - 1173

Implementation of Long Range Wireless IoT Device for Agriculture Using Multi-Hop Topology Design

Anchla Rajput, Anshul Sarawagi

Share this Article

Downloads: 41 | Weekly Hits: ⮙1 | Monthly Hits: ⮙5

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this Article

Downloads: 66 | Weekly Hits: ⮙11 | Monthly Hits: ⮙44

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 3, March 2021

Pages: 262 - 265

Data Gathering Optimization Using ACO and Genetic Algorithm in WSN

Shabir Ur Rashid, Mrigana Walia

Share this Article

Downloads: 70 | Weekly Hits: ⮙2 | Monthly Hits: ⮙16

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020

Pages: 1317 - 1319

A Survey on Usage of Artificial Intelligence Algorithm in Efficiency of WSN

Chaitanya Sharma

Share this Article

Similar Articles with Keyword 'Multi-hop routing'

Downloads: 110 | Weekly Hits: ⮙4 | Monthly Hits: ⮙9

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1944 - 1947

Design and Implementation of Tarf for WSNs

Kavita, Amareshwari Patil

Share this Article

Downloads: 110 | Weekly Hits: ⮙2 | Monthly Hits: ⮙12

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1292 - 1295

To Enhance Lifetime of WSN Using Multi-Hop Routing and Trust-Based Intrusion Detection

Sanghavi Parkhi, Hemlata Dakhore

Share this Article

Similar Articles with Keyword 'Encryption'

Downloads: 8 | Monthly Hits: ⮙8

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021

Pages: 788 - 791

A New Cryptography Algorithm Based on ASCII Code

Yaser M.A. Abualkas

Share this Article

Downloads: 73 | Weekly Hits: ⮙9

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 470 - 478

Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT

Aditya Tiwari, Ayush Pandey

Share this Article

Downloads: 93 | Weekly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

Downloads: 100 | Weekly Hits: ⮙1

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2457 - 2460

Privacy Preserved Encrypted Cloud Data Access

Anes P. A., Neethu Francis

Share this Article

Downloads: 100 | Weekly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1709 - 1712

A Business Framework for Securing Data Storage over Cloud Environment using ECC Crypto System

Nara Venkata Surendra Reddy, DLS Reddy

Share this Article



Top