24 Questions 51 Answers 0 Followers
Questions related from Ranjeeth Kumar Sundararajan
Is there any case study to express the internal attacks on Internet of Things?
03 March 2016 5,203 0 View
Is there any formulae or model to fix a threshold value for trust value to detect the attacks by the IDS in WSN?
02 February 2016 6,329 4 View
Whether there exists any specification based IDS for wireless sensor networks?
01 January 2016 7,560 4 View
I want to calculate the energy consumed by the individual sensor nodes and also the total energy consumption of the sensor network......Kindly suggest me some method to do the above......like...
09 September 2015 6,152 25 View
Journal citation report (JCR) of 2014 is released by thomson reuters in 2015.....
06 June 2015 6,026 2 View
I want to simulate the WSN using TOSSIM simulator. I need to know the installation method of TOSSIM?
11 November 2014 4,354 1 View
I need to know whether anyone implemented IDS in wireless sensor networks in real time. Practically, how to launch a attack in a sensor network and to detect the attack.
03 March 2014 5,323 1 View
Is anyone working on the research topic of IDS algorithm development for wireless sensor networks? If so, is it good to analyse certain threats? Is it possible to form generalized IDS for WSN?
03 March 2014 7,357 6 View
How to use MATLAB for simulating wireless sensor network algorithms? Simulating WSN in NS2, NS3, NETSIM etc and simulating WSN in MATLAB, which is efficient method and which method is preferable...
03 March 2014 1,395 3 View
Many researchers are considering the basic version of LEACH for their research work. Can anyone give me the recent efficient version of LEACH, as I wish to research the recent version not the...
02 February 2014 4,794 0 View
Has anyone done research work on developing the IDS for detecting the sinkhole attack on WSN protocols?
02 February 2014 4,245 0 View
How do you analyse the LEACH Output metrics in MATLAB?
02 February 2014 6,501 0 View
I need information about the working of Mannasim simulator using ns2.29, while installation i have errors in configuration part? Anyone have a solution?
02 February 2014 5,038 0 View
Whether the Mintroute, MultihopLQI, CTP protocols should only be used in Tinyos or can be used in other platforms?
02 February 2014 5,720 1 View
How to launch sinkhole attack in mintroute protocol of WSN?
01 January 2014 4,280 0 View
I need to know whether the COOJA simulator is efficient to simulate the security algorithms of Wireless Sensor Networks?
01 January 2014 551 13 View
-
12 December 2013 3,633 0 View
.
12 December 2013 2,933 0 View
Consider two attacks, black hole and sink hole attack, is it possible to detect both this attack in a single IDS algorithm? If there exists any such algorithm can anyone give me the reference paper?
12 December 2013 8,851 0 View
Is there anyone who has completed or is doing research in solving black hole attack in wireless sensor networks?
10 October 2013 2,889 2 View
Black hole attack
10 October 2013 6,768 1 View
What is the best solution that detect the black hole attack earlier in wireless sensor networks?
09 September 2013 3,157 8 View
Launching the black hole attack and to make the packets dropped is the objective and to find all possible ways of attacking so can design a efficient security algorithm.
07 July 2013 4,655 0 View
To make the nodes sleep when inactive and awake when active.
04 April 2013 6,225 4 View