Open Access
Subscription Access
Security In Wireless Sensor Networks: Comparative Study
The security in wireless sensor networks (WSNS) is a very important issue. These networks may be exposed it different attacks. With this in mind, researchers propose in this area variety of security techniques for this purpose, and this article describes security in wireless sensor networks. Discussed threats and attacks of wireless sensor networks. The article also aims to provide the basic information related to determining essential requirements for the protection WSNs. Lastly, we mention some security mechanisms against these threats and attacks in Wireless Sensor Network.
Keywords
Wireless Sensor Networks, Security Requirements, Attacks, Security Mechanisms.
User
Font Size
Information
- V. Kumar, A. Jain, and P. N. Barwal, “Wireless Sensor Networks: Security Issues, Challenges and Solutions,” Int. J. Inf. Comput. Technol., vol. 4, no. 8, pp. 859–868, 2014, [Online]. Available: http://www.irphouse.com.
- M. Teymourzadeh, R. Vahed, S. Alibeygi, and N. Dastanpor, “Security in Wireless Sensor Networks: Issues and Challenges,” arXiv, 2020, doi: 10.47277/ijcncs/1(7)7.
- Y. X. Li, Lian-Qin, and Qian-Liang, “Research on wireless sensor network security,” Proc. - 2010 Int. Conf. Comput. Intell. Secur. CIS 2010, pp. 493–496, 2010, doi: 10.1109/CIS.2010.113.
- M. A. Khan, G. A. Shah, and M. Sher, “Challenges for security in Wireless sensor networks (WSNs),” World Acad. Sci. Eng. Technol., vol. 80, no. 8, pp. 390–396, 2011, doi: 10.5281/zenodo.1334423.
- A. Rani and S. Kumar, “A survey of security in wireless sensor networks,” 3rd IEEE Int. Conf. , pp. 3–7, 2017, doi: 10.1109/CIACT.2017.7977334.
- M. A. Elsadig, A. Altigani, and M. A. A. Baraka, “Security issues and challenges on wireless sensor networks,” Int. J. Adv. Trends Comput. Sci. Eng., vol. 8, no. 4, pp. 1551–1559, 2019, doi: 10.30534/ijatcse/2019/78842019.
- H. Modares, R. Salleh, and A. Moravejosharieh, “Overview of security issues in wireless sensor networks,” Proc. - CIMSim 2011 3rd Int. Conf. Comput. Intell. Model. Simul., pp. 308–311, 2011, doi: 10.1109/CIMSim.2011.62.
- D. Martins and H. Guyennet, “Wireless sensor network attacks and security mechanisms: A short survey,” Proc. - 13th Int. Conf. Network-Based Inf. Syst. NBiS 2010, pp. 313–320, 2010, doi: 10.1109/NBiS.2010.11.
- M. Al and K. Yoshigoe, “Security and attacks in wireless sensor networks,” Netw. Secur. Adm. Manag. Adv. Technol. Pract., vol. 14, no. 2, pp. 183–216, 2011, doi: 10.4018/978-1-60960-777-7.ch010.
- A. Nelli and S. Mangasuli, “Wireless Sensor Networks: An Overview on Security Issues and Challenges,” Int. J. Adv. Eng. Manag. Sci., vol. 3, no. 3, pp. 209–214, 2017, doi: 10.24001/ijaems.3.3.10.
Abstract Views: 230
PDF Views: 117