Article Details

A Study on the Description of Centralized Systems and Decentralized Systems in Wireless Sensor Networks | Original Article

M. Jagadeeshwar*, N. Satyanarayana, in Journal of Advances and Scholarly Researches in Allied Education | Multidisciplinary Academic Research

ABSTRACT:

Protective devices like Key monitoring procedures, verification procedures and also safe directing cannot provide security to WSNs for these kinds of attacks. Breach discovery system is a solution to this trouble. It evaluations the network by collecting adequate amount of data and finds strange behavior of sensor node. IDS based protection mechanisms suggested for various other network models such as impromptu networks, cannot straight be made use of in WSNs. Scientists have actually suggested different invasion detection systems for wireless sensor networks throughout the last few years. Essentially these methods can be classified into 2 major classifications i.e. dispersed and stand alone.