Call for Paper - September 2020 Edition
IJCA solicits original research papers for the September 2020 Edition. Last date of manuscript submission is August 20, 2020. Read More

Security Challenges in Wireless Sensor Networks

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2017
Authors:
Monali Rajput, Usama Ghawte
10.5120/ijca2017914414

Monali Rajput and Usama Ghawte. Security Challenges in Wireless Sensor Networks. International Journal of Computer Applications 168(5):24-28, June 2017. BibTeX

@article{10.5120/ijca2017914414,
	author = {Monali Rajput and Usama Ghawte},
	title = {Security Challenges in Wireless Sensor Networks},
	journal = {International Journal of Computer Applications},
	issue_date = {June 2017},
	volume = {168},
	number = {5},
	month = {Jun},
	year = {2017},
	issn = {0975-8887},
	pages = {24-28},
	numpages = {5},
	url = {http://www.ijcaonline.org/archives/volume168/number5/27872-2017914414},
	doi = {10.5120/ijca2017914414},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}
}

Abstract

In recent years, Wireless Sensor Network (WSN) has shown a valid futuristic application in the field of medical, geology, industry and defence etc. The basic plan of a Wireless sensor network(WSN) is to spatially distributed autonomous devices using sensors to monitor physical or environmental conditions. Wireless communication technology exhibits different forms of security threats. [1] This paper introduces numerous security problems in wireless sensor network, by distinguishing various threats and therefore analysing those problems and stating some security measures within the WSN. We additionally discuss the security for making certain layered and robust(strong) security in wireless sensor networks

References

  1. Gaurav Jolly, Mustafa C. KuşÁu, Pallavi Kokate, and Mohamed Younis, Computer Science and Electrical Engineering, University of Maryland- “A Low-Energy Key Management Protocol for Wireless Sensor Networks”.
  2. C. Anuradha, “Stochastic Analysis of Various Security Protocols in Wireless Sensor Networks” Volume 3, Issue 2, February 2013 .
  3. Al-Sakib Khan Pathan, Hyung-Woo Lee, Choong Seon Hong “Security in Wireless Sensor Networks: Issues and Challenges” ISBN 89-5519-129-4, Feb. 20-22, 2006.
  4. Antonio dc la picdra, “Wireless Sensor Networks for Environmental Research: A Survey on Limitations and Challenges” 978-1-4673-2232-4/13.
  5. Chris Karlof, David Wagner- “Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures” Adhoc Networks 1,293-315.
  6. Feng Zhao Wireless Sensor Networks Morgan Kaufmann Publications.
  7. Security in wireless sensor networks (book)
  8. Anthony D. Wood,” Denial of Service in Sensor Networks” http://www.cs.virginia.edu/~adw5p/pubs.html
  9. Ann Holms , Ethan Culler-Mayeno, “A Technical Report: Wireless Sensor Networks and How They Work”
  10. C. Siva Ram Murthy and B.S. Manoj “Building wireless M2M & IoT sensor networks: issues and challenges”
  11. http://www.cs.cmu.edu (Refered for Sybil attack)
  12. https://www.techopedia.com (Refered for DOS attack)
  13. Wireless Sensor Networks and Applications (Book) edited by Ibrahiem M. M. El Emary, S.Ramakrishhnan.

Keywords

Wireless Sensor Network (WSN), Security.