z-logo
open-access-imgOpen Access
Enhancement of Security in Wireless Sensor Network by Using Trust Evaluation and TCP/IP Based Technology
Author(s) -
Rahul K. Das,
Mona Dwivedi
Publication year - 2022
Publication title -
international journal of innovative research in computer science and technology
Language(s) - English
Resource type - Journals
ISSN - 2347-5552
DOI - 10.55524/ijircst.2022.10.1.13
Subject(s) - wireless wan , computer network , wireless network , wi fi array , computer science , municipal wireless network , key distribution in wireless sensor networks , heterogeneous network , fixed wireless , wireless sensor network , wireless , base transceiver station , radio resource management , telecommunications
Today Wireless network technology are widely used technology in many organizations. Wireless LANs transmit and receive data without physical channel means over the air so no need for a wired connection. For this radio frequency (RF) technology is used. Without any cables attached, a wireless network allows devices to remain linked to the network. The main advantage of wireless network is that it is typically cheaper, simpler, quicker to set up as wireless network does not require expensive wiring. Mainly radio communication is used to implement wireless communication networks. At physical level of OSI model network structure this implementation takes place. Examples of wireless networks include cell phone networks, Wi-Fi local networks & terrestrial microwave networks. The advent of wireless sensor network has given birth to new kinds of routing algorithms and new security threats.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here