ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Analysis of Security Protocols in Wireless Sensor Network

Journal: International Journal of Advanced Networking and Applications (Vol.2, No. 03)

Publication Date:

Authors : ; ; ;

Page : 707-713

Keywords : Attacks; Threats; Security; Sensor nodes; Wireless Sensor Network;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Wireless Sensor Networks(WSNs) consists of low power, low-cost smart devices which have limited computing resources. With a widespread growth of the applications of WSN, the security mechanisms are also be a rising big issue. A lot of real world applications have been already deployed and many of them will be based on wireless sensor networks. These applications include geographical monitoring, medical care, manufacturing, transportation, military operations, environmental monitoring, industrial machine monitoring, and surveillance systems. This paper discusses typical constraints, security goals, threat models and typical attacks on sensor networks and their defensive techniques or countermeasures relevant to the sensor networks, including security methods. The most critical area prone to attack is nearby the base station as the data is more aggregated, that should be kept secure using a number of defensive techniques as stated.

Last modified: 2015-12-04 19:04:32