Analysis of Security Protocols in Wireless Sensor Network
Journal: International Journal of Advanced Networking and Applications (Vol.2, No. 03)Publication Date: 2010-11-01
Authors : Ritu Sharma; Yogesh Chaba; Yudhvir Singh;
Page : 707-713
Keywords : Attacks; Threats; Security; Sensor nodes; Wireless Sensor Network;
Abstract
Wireless Sensor Networks(WSNs) consists of low power, low-cost smart devices which have limited computing resources. With a widespread growth of the applications of WSN, the security mechanisms are also be a rising big issue. A lot of real world applications have been already deployed and many of them will be based on wireless sensor networks. These applications include geographical monitoring, medical care, manufacturing, transportation, military operations, environmental monitoring, industrial machine monitoring, and surveillance systems. This paper discusses typical constraints, security goals, threat models and typical attacks on sensor networks and their defensive techniques or countermeasures relevant to the sensor networks, including security methods. The most critical area prone to attack is nearby the base station as the data is more aggregated, that should be kept secure using a number of defensive techniques as stated.
Other Latest Articles
- Registration and Aggregate Cache Routing for Ad hoc Network
- An Efficient Congestion Avoidance Scheme for Mobile Healthcare Wireless Sensor Networks
- Effective Network Intrusion Detection using Classifiers Decision Trees and Decision rules
- QoS for Real Rime Transmission on MANET
- Secure and Faster Clustering Environment for Advanced Image Compression
Last modified: 2015-12-04 19:04:32