Authors :
DUSHIMIYIMANA Eric; Dr. Musoni Wilson
Volume/Issue :
Volume 7 - 2022, Issue 11 - November
Google Scholar :
https://bit.ly/3IIfn9N
Scribd :
https://bit.ly/3VD0Sej
DOI :
https://doi.org/10.5281/zenodo.7374771
Abstract :
- This research focused on: understanding the
effects of sinkhole isolation or Network Access
Control(NAC) isolation on the Wireless sensor
Networks System (WSNs).
Investigating cryptography-based strategies to limit
network degradation caused by the isolation of sinkhole.
The WSNs is a self-configuring network that does not have
centralized control. Sensing devices are referred to as
nodes.
The main reasons for this research are to look at the
effects of isolation of sinkhole in the wireless sensor
Network System, and to look at the steps to be taken to
prevent malicious attacks. Malicious can also join the
network and launch various active and passive attacks,
Malicious attacks have a detrimental effect on the Network
and on users of the Internet with insufficient security. it is
we who must establish reliable protection. For many
applications, security (i.e., confidentiality, integrity and
availability of information).
The results of this research study was achieved
through qualitative technique of primary research. An
open-ended interviews are aimed to be conducted with the
identified sample population(IT) in which they were given a
complete chance to share their opinions and views about
asked questions and research problem. Moreover, the
sample population of this study includes the individuals
from IT industry
- This research focused on: understanding the
effects of sinkhole isolation or Network Access
Control(NAC) isolation on the Wireless sensor
Networks System (WSNs).
Investigating cryptography-based strategies to limit
network degradation caused by the isolation of sinkhole.
The WSNs is a self-configuring network that does not have
centralized control. Sensing devices are referred to as
nodes.
The main reasons for this research are to look at the
effects of isolation of sinkhole in the wireless sensor
Network System, and to look at the steps to be taken to
prevent malicious attacks. Malicious can also join the
network and launch various active and passive attacks,
Malicious attacks have a detrimental effect on the Network
and on users of the Internet with insufficient security. it is
we who must establish reliable protection. For many
applications, security (i.e., confidentiality, integrity and
availability of information).
The results of this research study was achieved
through qualitative technique of primary research. An
open-ended interviews are aimed to be conducted with the
identified sample population(IT) in which they were given a
complete chance to share their opinions and views about
asked questions and research problem. Moreover, the
sample population of this study includes the individuals
from IT industry