Security in wireless sensor networks

  IJCTT-book-cover
 
         
 
© 2020 by IJCTT Journal
Volume-68 Issue-1
Year of Publication : 2020
Authors : Ms.S.Sabeena, Ms.R.Iniya
DOI :  10.14445/22312803/IJCTT-V68I1P106

How to Cite?

Ms.S.Sabeena, Ms.R.Iniya, "Security in wireless sensor networks," International Journal of Computer Trends and Technology, vol. 68, no. 1, pp. 26-30, 2020. Crossref, https://doi.org/10.14445/22312803/IJCTT-V68I1P106

Abstract
The idea of Wireless Sensor Networks (WSN) was brought about by very small sensor nodes that are capable of sensing, data processing and wireless communication. Without the aid of any pre existing network infrastructure WSN provides network connectivity. In a complex environment, WSN ensures large scale real-time data processing. As the WSN technologies are facing a tremendous growth in the recent years, the security becomes a critical issue. In this paper we presented the security issues involved in the WSN systems and also paved the way for the corrective measures of such issues.

Reference
[1] Youssef charfi, Naoki wakamiya and Masayuki murata, “Challenging issues in visual sensor networks”, Japan society for the promotion of science.
[2] Tanveer Zia and Albert zomaya, “Security issues in wireless sensor networks”, international conference on systems and networks communication, 2006.
[3] Muawia Abdelmagid Elsadig, “Security issues and challenges in wireless sensor networks”, international journal of advanced trends in computer science and engineering, august 2019.
[4] Mahfuzulhoq chowdhury, Mdfazlul Kader, “Security issues in wireless sensor networks - a survey”, October 2013.
[5] Mohamed lamine Messai,”Classification of attacks in wireless sensor networks”, international congress on telecommunication and applications, April 14, 2014.
[6] S.Nithya and Dr.C.Gomathy,”An investigation on security attacks in wireless sensor networks”, international journal of pure and applied mathematics, volume 119, November 15, 2018.
[7] Madhumita panda, “Security in wireless sensor networks using cryptographic techniques”, American journal of engineering research, volume 03, issue-01, 2014.
[8] Yingpeng Sang and Hong Shen, “Secure data aggregation in wireless sensor networks”, IEEE, international conference on parallel and distributed computing, 2006.
[9] Ms.Poonam Barua and Mr.Sanjeev Indora, “Overview of security threats in wireless sensor networks”, international journal of computer science and mobile computing, IJCSMC volume 2, July 7, 2013.
[10] Baojiang Cui, Ziyue Wang and Bing Zhao, “Enhanced key management protocols for wireless sensor networks”, mobile information systems, article id 627548, 2015.
[11] M.Nikijoo, A.S.Tehrani and P.Kumarawadu, “secure routing in sensor networks”, IEEE 2009, pp.978 – 981.
[12] D.Djenouri, L.Khelladi and A.Nahjiib Badache, “a survey of security issues in mobile ad.hoc and sensor networks”, IEEE communications survey and tutorials, volume 7, no.4, fourth quarter 2005.
[13] Y.Sun, Z.Han and K.J.Payliu, “defense of trust management vulnerabilities in distributed network”, IEEE communications magazine, February 2008, pp.112-119.
[14] X.Chan, K.Makki K.Yen and N.Pissinou, “Sensor network security – a survey “, IEEE communications survey and tutorials, volume 11, no.2, second quarter 2009, pp.52-73.
[15] G.Bianchi, “A comparative study of the various security approaches used in wireless sensor networks”, international journal of advanced science and technology, volume 17, April 2010, pp.31-44.
[16] T.A.Zia, “A security framework for wireless sensor networks”, http://ses.library.usyd.edu.au/bitstream/2123/2258/4/02wh ole.pd6, 2008.

Keywords
Wireless Sensor Networks, security restrictions, WSN attacks, security solutions.