A Survey on Security Solutions In Wireless Sensor Networks
Proceeding: The Second International Conference on e-Technologies and Networks for Development (ICeND)Publication Date: 2013-3-4
Authors : Hind Annahidh Soha S. Zaghloul;
Page : 94-98
Keywords : Wireless Sensor Networks; Secure Data Aggregation; Encryption; Authentication; Key Management.;
Abstract
Wireless Sensor Networks are deployed in sensitive and unattended areas that cannot be reached by human beings. Therefore, it is difficult to maintain them. In addition, sensors are of limited memory, processing power and energy by nature. By consequence, this makes WSN subject to attacks such as network failure, data acquisition and modification, etc. Many security solutions are exposed in the literature to overcome this problem. Secure data aggregation, encryption and authentication, and key management are developed to maintain the security of the WSN. This paper overviews different security solutions in the literature and illustrates their target. Moreover, it conducts a comparative study between them in terms of confidentiality, integrity, freshness and authentication.
Other Latest Articles
- A Hierarchical-Cellular Fault Management Scheme For Ad Hoc Wireless Sensor Networks
- Fault Tolerance Models In Ad Hoc Wireless Sensor Networks
- Performance Evaluation Of Enhanced Routing Discovery Under Different Mobility Models In MANETs
- Short-Term Use Of Cell Phones Has No Significant Effect On The Salivary Oxidant/Antioxidant Profile
- Personalized Media Recommendation Algorithm Based On Smart Home
Last modified: 2013-06-18 22:05:50