SECURITY ISSUES IN WSN/WSN SIMULATORS
Key Management Approach for Secure Multicast Communications in Virtual Private NetworksN. Sreenath, P. Annadurai and S. Vijayalakshmi
A Low Cost GSM Based Wireless Home Security SystemM. Rajesh Kumar and Daniel Arun Kumar
Co Operative Approach to Detect Misbehaving Nodes in Manets using Multi Hop Acknowledgement Scheme S. Usha and S. Radha
Code Attestation using Merkle Hash TreeTanmay Shah and Devesh C. Jinwala
Automobile Monitoring System using RF-IDM. Chandraprasaad and T.S. Rakesh
Secure Data Aggregation in Wireless Sensor Networks - A SurveyParesh Solanki and Gaurang Raval
Hop Count Based Packet Processsing Approach to Counter DDoS AttacksBharathi KrishnaKumar, R. Sukanesh and P. Krishna Kumar
Defeating Denial of Sleep Attacks in Wireless Sensor NetworksK. Thangaraj, R. Samson Ravindran, H. Lilly Beaulah and G. Prakash
Efficient use of Identity Based Encryption in Wireless Body Sensor NetworkBasant Tiwari, Setu Ku. Chaturvedi and Sanjay Silakari
Fool Proof Financial Transaction using Client Puzzle (F2TUCP) – A Resilient Counter Measure to Thwart Smurf AttackN. Sreenath and S. Vijayalakshmi
A Survey on Privacy and Security Issues in Wireless Sensor Networks / Personal Sensor NetworkSanjeev Kulkarni
Cryptography using Neural NetworkP.S. Revankar and D.T. Rathod
Theoretical Analysis of QuadrotorsB. Vigneshram , Amit Patwardhan and Rabinder Henry
Communication Subsystem Shekhar Rai, K.P. Rishvanth and Chandresh Mittal
Dynamic Pass Pattern Scheme for Online Authentication P. Kalyani, C. Chellappan, S.K. Mohana Sundaram and S. Ramraj
Special Issues and Impact of Zigbee Technology in Future Data Communication SystemS.S. Riaz Ahamed and M.A. Saleem Durai
Service Denunciation in Sensor NetworksS. Vinjosh Reddy, K. Rijutha, K. Sai Ramani and G. Abhishek
A Cross-Layer Based Intrusion Detection Technique for Wireless NetworksJatinder Singh, Lakhwinder Kaur and Savita Gupta