Open Access Open Access  Restricted Access Subscription Access

Analysis of Security Protocols in Wireless Sensor Network


Affiliations
1 Department of Computer Science & Engineering, Guru Jambheshwar University of Science & Technology, Hisar (Haryana), India
 

Wireless Sensor Networks(WSNs) consists of low power, low-cost smart devices which have limited computing resources. With a widespread growth of the applications of WSN, the security mechanisms are also be a rising big issue. A lot of real-world applications have been already deployed and many of them will be based on wireless sensor networks. These applications include geographical monitoring, medical care, manufacturing, transportation, military operations, environmental monitoring, industrial machine monitoring, and surveillance systems. This paper discusses typical constraints, security goals, threat models and typical attacks on sensor networks and their defensive techniques or countermeasures relevant to the sensor networks, including security methods. The most critical area prone to attack is nearby the base station as the data is more aggregated, that should be kept secure using a number of defensive techniques as stated.

Keywords

Attacks, Threats, Security, Sensor Nodes, Wireless Sensor Network.
User
Notifications
Font Size

Abstract Views: 130

PDF Views: 0




  • Analysis of Security Protocols in Wireless Sensor Network

Abstract Views: 130  |  PDF Views: 0

Authors

Ritu Sharma
Department of Computer Science & Engineering, Guru Jambheshwar University of Science & Technology, Hisar (Haryana), India
Yogesh Chaba
Department of Computer Science & Engineering, Guru Jambheshwar University of Science & Technology, Hisar (Haryana), India
Yudhvir Singh
Department of Computer Science & Engineering, Guru Jambheshwar University of Science & Technology, Hisar (Haryana), India

Abstract


Wireless Sensor Networks(WSNs) consists of low power, low-cost smart devices which have limited computing resources. With a widespread growth of the applications of WSN, the security mechanisms are also be a rising big issue. A lot of real-world applications have been already deployed and many of them will be based on wireless sensor networks. These applications include geographical monitoring, medical care, manufacturing, transportation, military operations, environmental monitoring, industrial machine monitoring, and surveillance systems. This paper discusses typical constraints, security goals, threat models and typical attacks on sensor networks and their defensive techniques or countermeasures relevant to the sensor networks, including security methods. The most critical area prone to attack is nearby the base station as the data is more aggregated, that should be kept secure using a number of defensive techniques as stated.

Keywords


Attacks, Threats, Security, Sensor Nodes, Wireless Sensor Network.