CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Survey on Security Improvement using Wireless Sensor Networks

by R. Santhosh, M. Shalini
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 162 - Number 7
Year of Publication: 2017
Authors: R. Santhosh, M. Shalini
10.5120/ijca2017913428

R. Santhosh, M. Shalini . Survey on Security Improvement using Wireless Sensor Networks. International Journal of Computer Applications. 162, 7 ( Mar 2017), 38-40. DOI=10.5120/ijca2017913428

@article{ 10.5120/ijca2017913428,
author = { R. Santhosh, M. Shalini },
title = { Survey on Security Improvement using Wireless Sensor Networks },
journal = { International Journal of Computer Applications },
issue_date = { Mar 2017 },
volume = { 162 },
number = { 7 },
month = { Mar },
year = { 2017 },
issn = { 0975-8887 },
pages = { 38-40 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume162/number7/27259-2017913428/ },
doi = { 10.5120/ijca2017913428 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:08:25.202256+05:30
%A R. Santhosh
%A M. Shalini
%T Survey on Security Improvement using Wireless Sensor Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 162
%N 7
%P 38-40
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Depending on applications used in WSN, Security is one of the greatest challenge in WSNs. To ensure confidentiality of data in sensor networks, various types of security mechanisms are proposed. Drawbacks like security vulnerabilities are associated with those schemes. In this paper a survey is taken related to the security purpose. Implementation of security for wsn influence a great deal due to their size and energy limitations.To rectify these drawbacks chaotic maps and genetic operations are used. This algorithm is helps in encoding the data. Along that secure encryption transaction algorithm is implemented.

References
  1. Mr. Bhavin N Patel, Ms. Neha Pandya, “Secure Data Transfer using Cryptography with Virtual Energy for Wireless Sensor Network”.
  2. Sadaqat Ur Rehman, Muhammad Bilal, Basharat Ahmad, Khawaja Muhammad Yahya, Anees Ullah, Obaid Ur Rehman, “Comparison Based Analysis of Different Cryptographic and Encryption Techniques Using Message Authentication Code (MAC) in Wireless Sensor Networks (WSN)”.
  3. Jian Li, Yun Li, Jian Ren Jie Wu, “Hop by Hop Message Authentication and Source Privacy in Wireless Sensor Networks”.
  4. F. Ye, H. Lou, S. Lu and L. Zhang, “Statistical enroute filtering of injected false data in sensor networks”.
  5. S. Zhu, S. Setia, S. Jajodia and P. Ning, “An interleaved hop by hop authentication scheme for filtering false data in sensor networks”.
  6. C. Blundo, A. De Santis, A. Herzberg, S. Kutten, U. Vaccaro and M. Yung, “Perfectly secure key distribution for dynamic conferences”.
  7. W. Zhang, N. Subramanian and G. Wang, “Lightweight and compromise resilient message authentication in sensor networks”.
  8. H. Wang, S. Sheng, C. Tan, and Q. Li, “Comparing symmetric key and public key based security schemes in sensor networks”.
  9. ChungKuo Chang, J. Marc Overhage, Jeffrey Huang, “An Application of Sensor Networks for Syndromic Surveillance”.
  10. Matthew N. Vella, “Survey of Wireless Sensor Network Security”.
  11. Xiaojiang Du, North Dakota State University and HsiaoHwa Chen, National Cheng Kung University “Security in Wireless Sensor Networks”.
  12. Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J. D. Tygar, “SPINS: Security Protocols for Sensor Networks”.
  13. SungChul Jung , HyoungKee Choi, “An Energy aware Routing Protocol Considering Link Layer Security in Wireless Sensor Networks”.
  14. Zheng Gong1, Svetla Nikova1;2 and Yee Wei Law, “KLEIN: A New Family of Lightweight Block Ciphers”
  15. Lander Casado and Philippas Tsigas, “ContikiSec: A Secure Network Layer for Wireless Sensor Networks under the Contiki Operating System”.
  16. Suraj Kumar Khuraijam, Dr Radhika K R (2013), “A Novel Symmetric Key Encryption Algorithm Based on RC5 in Wireless Sensor Network”.
  17. Shanta Mandal And Rituparna Chaki(2012),”A Secure Encryption Logic For Communication In Wireless Sensor Networks”.
  18. Md. Anisur Rahman and Mitu Kumar Debnath, “An Energy Efficient Data Security System for Wireless Sensor Network”.
  19. Mohammad ALRousan, A.Rjoub and Ahmad Baset, “A low energy security algorithm for exchanging information in wireless sensor networks”.
  20. Y.W. Law, S. Dulman, S. Etalle, P. Havinga (2002), “Assessing security critical energy efficient sensor network”.
  21. I. Ituen and G. Sohn, “The Environmental Applications of Wireless Sensor Networks”
  22. Wang, X. and Yu, H., "How to Break MD5 and Other Hash Functions".
Index Terms

Computer Science
Information Sciences

Keywords

Security sensor network protocols