Security Based Intelligent Device in Wireless Sensor Network
DOI:
https://doi.org/10.61841/c4xebt08Keywords:
Wireless sensor network, security alarm, intelligent device.Abstract
"Security" is one of the basic issues in a propelled neighbourhood condition. The present centre around research and formative issues of "Wireless Sensor Network (WSN)" based Smart Home. "Wireless Sensor Network (WSN)" based smart home detection device gives a protected and safe living environment. A "Wireless Sensor Network (WSN)" is a system that is developing by using tiny independent hubs (sensors). The inspiration is to display certain environmental parameters, such as, temperature, movement, dampness, sound, brilliance, weight, etc. This paper describes the improvement of a shrewd home environment based on the "Wireless Sensor Network (WSN)" and moreover delineates private essentialness watching and controlling tasks for smart home systems organization structure. This paper proposes an essential and flexible remote set up for “domestic’s computerization” of light, temperature, movement, moistness and gas by executing the dependable sensor hubs that could be controlled too watched. This development offers stimulating and new opportunity to construct the accessibility of devices within the home for "home computing".
Downloads
References
[1] K. Y. Lian, S. J. Hsiao, and W. T. Sung, “Intelligent multi-sensor control system based on innovative
technology integration via ZigBee and Wi-Fi networks,” J. Netw. Comput. Appl., 2013.
[2] Z. Sheng, H. Wang, C. Yin, X. Hu, S. Yang, and V. C. M. Leung, “Lightweight Management of ResourceConstrained Sensor Devices in Internet of Things,” IEEE Internet Things J., 2015.
[3] N. M. Kumar and P. K. Mallick, “Blockchain technology for security issues and challenges in IoT,” in
Procedia Computer Science, 2018.
[4] J. Li, M. Li, J. Xin, B. Lai, and Q. Ma, “Wireless sensor network for indoor air quality monitoring,” Sensors
and Transducers, 2014.
[5] A. Saeed, A. Ahmadinia, A. Javed, and H. Larijani, “Random neural network based intelligent intrusion
detection for wireless sensor networks,” in Procedia Computer Science, 2016.
[6] . N. P., “WIRELESS SENSOR NETWORK USING ZIGBEE,” Int. J. Res. Eng. Technol., 2013.
[7] V. Kumar, G. Oikonomou, T. Tryfonas, D. Page, and I. Phillips, “Digital investigations for IPv6-based
wireless sensor networks,” in Proceedings of the Digital Forensic Research Conference, DFRWS 2014 USA,
2014.
[8] G. Cerullo, G. Mazzeo, G. Papale, B. Ragucci, and L. Sgaglione, “IoT and Sensor Networks Security,” in
Security and Resilience in Intelligent Data-Centric Systems and Communication Networks, 2017.
[9] I. Raju and P. Parwekar, “Detection of sinkhole attack in wireless sensor network,” in Advances in Intelligent
Systems and Computing, 2016.
[10] B. Mostefa and G. Abdelkader, “A survey of wireless sensor network security in the context of Internet of
Things,” in Proceedings of the 2017 4th International Conference on Information and Communication
Technologies for Disaster Management, ICT-DM 2017, 2018.
[11] M. L. Messai and H. Seba, “A survey of key management schemes in multi-phase wireless sensor networks,”
Computer Networks. 2016.
[12] J. T. Kim, “Requirement of security for IoT application based on gateway,” Int. J. Secur. its Appl., 2015.
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.