ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login


Journal: International Journal of Advanced Research in Engineering and Technology (IJARET) (Vol.10, No. 2)

Publication Date:

Authors : ; ;

Page : 263-270

Keywords : Data security; end-to-end; DoS attack; wireless sensor network;

Source : Downloadexternal Find it from : Google Scholarexternal


Recently, WSNs have drawn a lot of attention due to their broad applications in both military and civilian domains. Data security is essential for success of WSN applications, exclusively for those mission-critical applications working in unattended and even hostile environments which may be exposed to several attacks. This inspired the research on Data security for WSNs. Attacks due to node compromise include Denial of service (DoS) attacks such as selective forwarding attacks and report disruption attacks. Nearby many techniques have been proposed in the literature for data security. Hop-hop security works well when assuming a uniform wireless communication pattern and this security designs provides only hop-hop security. Node to sink communication is the dominant communication pattern in WSNs and hop-hop security design is not sufficient as it is exposed to several attacks due to node compromise. Location aware end-end data security (LEDS) provides end-end security.

Last modified: 2019-05-07 20:37:57