logo

(PDF) Research Methods in Computing

26 Pages6517 Words161 Views
   

Added on  2021-04-17

(PDF) Research Methods in Computing

   Added on 2021-04-17

ShareRelated Documents
Running head:RESEARCH METHODS FOR COMPUTINGAnalyzing the authentication and security maintenance in Wireless Sensor NetworkName of the Student:Name of the University:
(PDF) Research Methods in Computing_1
1RESEARCH METHODS FOR COMPUTINGTable of ContentsPart 1: Literature Review.................................................................................................................31.0 Introduction............................................................................................................................32.0 Research Questions................................................................................................................43.0 Relevance of the research topic.............................................................................................43.1 Security and authentication issues in wireless networks...................................................53.2 Authentication and security maintenance into the wireless networks...............................63.3 Limitation of authentication and security maintenance into wireless networks................84.0 Conclusion.................................................................................................................................8Part 2: Project Proposal.................................................................................................................101.0 Research purpose.................................................................................................................102.0 Background context.............................................................................................................103.0 Research methodology.........................................................................................................123.1 Research philosophy........................................................................................................123.2 Research approach...........................................................................................................123.3 Research design...............................................................................................................133.4 Data sources.....................................................................................................................133.5 Data analysis techniques..................................................................................................14
(PDF) Research Methods in Computing_2
2RESEARCH METHODS FOR COMPUTING4.0 Evaluation methodology......................................................................................................145.0 Schedule and publishing......................................................................................................166.0 Professional, legal and ethical issues...................................................................................19References......................................................................................................................................21
(PDF) Research Methods in Computing_3
3RESEARCH METHODS FOR COMPUTINGPart 1: Literature Review1.0 Introduction The paper is based on “Analyzing the authentication and security maintenance inWireless Sensor Network (WSN)”. It is technology from progress of the dissimilar fields todiminish the false data attacks. Into the WSN, the sensor nodes are introduced the false datathroughout data aggregation as well as data forwarding. The application of WSN is dependent onthe data about the positions of the sensor nodes. Rajeswari and Seenivasagam (2016) stated thatWSN is used into the environment where there is energy replacement which is complex. As thereare limited resources, WSN requires pleasing the application to detailed QoS required reducingconsumption to outspread the lifetime of system as well as maintenance of system. Kumari andOm (2016) argued that WSN is such a network which consists of sensor nodes to cultivate thesecurity level. Authentication is basic security services into open as well as vulnerable communicationnetwork. Security maintenance is required into WSN to secure the data and information ofcustomers (He et al. 2013). Authentication is core security into the computing which requires ofmutual trust among the parties. The tools which are used for authentication of the wirelessnetworks are cryptographic algorithms. Biometric is also used to maintain security of network bywhich the human acquires of token which is presented for authentication mechanisms. WSN isshowing of security attacks with dishonest injection of data. The sensor nodes are collaboratedand conveyed nodes altered by inserting of false data (Han et al. 2014). The false data are beinginjected by the sensor nodes with aggregation of data. The confidentiality of data chooses thedata to encrypt at the source nodes and it is decrypted at destination. Xu et al. (2014)
(PDF) Research Methods in Computing_4
4RESEARCH METHODS FOR COMPUTINGinvestigated that each of the sensor nodes are able to accumulate and promote of data but it is notimproving the network security. 2.0 Research Questions WSN consists of some properties as well as features. The sensor nodes are configuredinto the network. The nodes are being deployed thickly. Various nodes are being collaborated tosense the data which lead to data redundancy. The nodes into the sensor network are smaller insize which is suitable for various environments. Into the network sensor, there is lack of storageof data along with power. The sensor nodes are being damaged easily when it is used underuncontrollable conditions of the environment. According to Tajeddine, Kayssi and Chehab(2012), ESN is followed of some traffic patterns. Data from various sensor nodes are beingcommunicated to the central nodes. It is consisted of sensor nodes which are vary into size alongwith computing power. Following are the research questions based on selected research topic:1.What are the security issues in wireless sensor network?2.How to maintain security and authentication in wireless sensor network?Based on selected two of the research questions, the researcher performs the study andidentifies the security issues into wireless networks. The selected research articles for this studyare mainly summarizing the secured authentication furthermore integrity techniques forrandomized secured routing in WSN. 3.0 Relevance of the research topic This research topic is selected for this study as authentication and security maintenanceprocess into WSN aims to achieve of higher technique of bandwidth on dropping the attacker oninjecting the false data attack. It provides the authentication pattern on the sensor network to
(PDF) Research Methods in Computing_5
5RESEARCH METHODS FOR COMPUTINGovercome the false data injections. This research study summarizes the authentication along withmaintenance of the security into the wireless network (Marin, Pawlowski and Jara, 2015). It alsoprovides limitation of authentication and security maintenance into wireless networks. Thispaper discusses about the challenges into the security areas and taking of security mechanismsschemes. The security attacks are resulted into false data into the wireless sensor network. It isdetected intelligences which is injected by cooperated the nodes into this research study. In orderto secure the wireless sensor networks, there is designed of authentication system (Gope andHwang, 2016). Into this particular system, the security maintenance level is being increased byclarification of the false data. The aim of this particular research work increases of security alongwith prevention level into the wireless network. Security becomes a main issue intoconfidentiality of data based on different threats. In this particular paper, the researcher studiedthe security threats into WSN. 3.1 Security and authentication issues in wireless networksZhang, Tang and Luo (2016) discussed that network is being attacked along with thenodes are tampered. The nodes are being deployed with close interaction with environment.Kumaresan and Macriga (2017) argued that the attackers can easily access to the nodes and ableto extract the confidential and sensitive information. They discard those data and modified it.According to Sang and Arora (2012), the attackers are targeting routing information whichmisguides the traffic of the network. They are also targeting the transmission of data without anykind of network disturbances. It is caused due to unreliable wireless mechanisms. WSN isproposed to process along with provide sensed data to the network users on demands. The sensornodes are being generated with redundant data. It leads to loss of the efficiency of energy. The
(PDF) Research Methods in Computing_6

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Efficient IDS(intrusion detection system) in WSN (Wireless sensor network) : Report
|5
|1680
|214

Introduction to Computer Security Program PDF
|16
|2832
|170

Network Security Attacks: Empirical and Business Research
|10
|2787
|394

Network Security Management
|12
|3039
|83

Intelligent Building Technology 31 Intelligent Building Technology
|32
|6415
|452

Internet of Things (IOT) and Home Network
|13
|2239
|301