We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Security Issues and Solutions in Wireless Sensor Networks

by Rutuja Jadhav, Vatsala
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 162 - Number 2
Year of Publication: 2017
Authors: Rutuja Jadhav, Vatsala
10.5120/ijca2017913256

Rutuja Jadhav, Vatsala . Security Issues and Solutions in Wireless Sensor Networks. International Journal of Computer Applications. 162, 2 ( Mar 2017), 14-19. DOI=10.5120/ijca2017913256

@article{ 10.5120/ijca2017913256,
author = { Rutuja Jadhav, Vatsala },
title = { Security Issues and Solutions in Wireless Sensor Networks },
journal = { International Journal of Computer Applications },
issue_date = { Mar 2017 },
volume = { 162 },
number = { 2 },
month = { Mar },
year = { 2017 },
issn = { 0975-8887 },
pages = { 14-19 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume162/number2/27213-2017913256/ },
doi = { 10.5120/ijca2017913256 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:07:50.590776+05:30
%A Rutuja Jadhav
%A Vatsala
%T Security Issues and Solutions in Wireless Sensor Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 162
%N 2
%P 14-19
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper focuses and talks about the wide and varied areas of applications wireless sensor networks have taken over today, right from military surveillance and smart home automation to medical and environmental monitoring. It also gives a gist why security is a primary issue of concern even today for the same, discussing the existing solutions along with outlining the security issues and suggesting possible directions of research over the same. This paper is about the security of wireless sensor networks. These networks create new security threats in comparison to the traditional methods due to some unique characteristics of these networks. A detailed study of the threats, risks and attacks need to be done in order to come up with proper security solutions. Here the paper presents the unique characteristics of these networks and how they pose new security threats. There are several security goals of these networks. These goals and requirements must be kept in mind while designing of security solutions for these networks. It also describes the various attacks that are possible at important layers such as data-link, network, physical and transport layer.

References
  1. Wireless Network Security: Vulnerabilities, Threats and Countermeasures, Min-kyu Choi, Rosslin John Robles, Chang-hwa Hong, Tai-hoon Kim ,International Journal of Multimedia and Ubiquitous Engineering
  2. Wireless Network Security, Yang Xiao, Hui Chen, Shuhui Yang, Yi-Bing Lin, and Ding-Zhu Du, EURASIP Journal on Wireless Communications and Networking
  3. A Survey of Wireless Sensor Network Security, Mr. Prasad Mahajan, Miss Priyanka Bhute, International Journal of Advanced Research in Computer and Communication Engineering
  4. Security in Wireless Sensor Network , Pritesh Patel, Nikhil Lende, International Journal of Advanced Research in Computer Engineering & Technology
  5. Review of Security Attacks and Issues in Wireless Sensor Network, Mohammad Ziaullah, Roshan Ara, Prakash Shetty, IJREAT International Journal of Research in Engineering & Advanced Technology
  6. Wireless Network Security 802.11, Bluetooth and Handheld Devices, Tom Karygiannis Les Owens, NIST, National Institute Of Standards and Technology
  7. WIRELESS SENSOR NETWORK SECURITY ANALYSIS, Hemanta Kumar Kalita, Avijit Kar, International Journal of Next-Generation Networks (IJNGN)
  8. A SURVEY ON AUTHENTICATION AND SECURITY MAINTENANCE IN WIRELESS SENSOR NETWORK, Ms.L.Devi., Dr.S.P.Shantharajah, International Journal of Computer Science and Mobile Computing
  9. Wireless Sensor Networks: Security Issues, Challenges and Solutions, Vikash Kumar, Anshu Jain, P N Barwal, International Journal of Information & Computation Technology.
  10. Security Threats in Wireless Sensor Networks, Sushma, Deepak Nandal, Vikas Nandal, IJCSMS Interna tional Journal of Computer Science & Management Studies.
  11. Security Solutions for Wireless Sensor Networks, Dirk WESTHOFF, Joao GIRAO, Amardeo SARMA, General Papers
  12. Wireless Sensor Network Security: A Survey, John Paul Walters, Zhengqiang Liang, Weisong Shi, Vipin Chaudhary, Security in Distributed, Grid, and Pervasive Computing Yang Xiao,(Eds.) pp. – - – c °2006 Auerbach Publications, CRC Press
  13. Security Issues In Wireless Sensor Networks, Yenumula B Reddy, SENSORCOMM 2011
  14. Routing Protocols in Wireless Sensor Networks – A Survey, Shio Kumar Singh, M P Singh , and D K Singh, International Journal of Computer Science & Engineering Survey (IJCSES)
  15. Protocol Design and Implementation for Wireless Sensor Networks, PIERGIUSEPPE DI MARCO, KTH Electrical Engineering
  16. Wireless Sensor Network Security: A SurveyJohn Paul Walters, Zhengqiang Liang, Weisong Shi, and Vipin Chaudhary Department of Computer Science Wayne State University
  17. SECURITY IN WIRELESS SENSOR NETWORKSBy ADRIAN PERRIG, JOHN STANKOVIC, and DAVID WAGNER COMMUNICATIONS OF THE ACM June 2004/Vol. 47, No. 6
  18. Issues in Wireless Sensor Networks Gowrishankar.S 1, T.G.Basavaraju 2, Manjaiah D.H 3, Subir Kumar Sarkar 4 Proceedings of the World Congress on Engineering 2008 Vol I WCE 2008, July 2 - 4, 2008, London, U.K.
  19. Some issues and challenges of Wireless Sensor Networks Himani Chawla CSE Dept. Maharishi markandeshwar university Ambala, Haryana, India Volume 4, Issue 7, July 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering
  20. Security Issues in Wireless Sensor Networks: Attacks and Countermeasures Kahina CHELLI Proceedings of the World Congress on Engineering 2015 Vol I WCE 2015, July 1 - 3, 2015, London, U.K.
  21. Design Issues and Challenges in Wireless Sensor Networks Khushboo Gupta PhD Research scholar Department of Computer Science Engineering Uttar Pradesh technical university, Lucknow, India Vaishali Sikka M.Tech (Information Technology) Department of Computer Science Engineering Banasthali Vidhyapith, Jaipur, IndiaInternational Journal of Computer Applications (0975 – 8887) Volume 112 – No 4, February 2015
  22. SECURITY IN WIRELESS SENSOR NETWORKS: KEY MANAGEMENT MODULE IN SOOAWSN Mohammed A. Abuhelaleh and Khaled M. Elleithy School of Engineering University Of Bridgeport, Bridgeport,CT
  23. Security in Wireless Sensor Networks: Attacks and SolutionsSwati Bartariya, Ashutosh RastogiInternational Journal of Advanced Research in Computer and Communication Engineering
  24. Wireless Sensor Networks Attacks and Solutions Naser Alajmi Computer Science and Engineering Department, University of BridgeportInternational Journal of Computer Science and Information Security
  25. Secure Wireless Sensor Networks: Problems and Solutions Fei Hu * Jim Ziobro ** Jason Tillett *** Neeraj K. SharmaIEEE Vol 1- Number 4
  26. Security in Wireless Sensor Networks By Koffka Khan, Wayne Goodridge & Diana RagbirGlobal Journal of Computer Science and Technology Network, Web & Security Volume 12 Issue 16 Version 1.0
  27. A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks Dr. G. Padmavathi, Prof and Head, Dept. of Computer Science Mrs. D. Shanmugapriya, Lecturer, Dept. of Information Technology, Avinashilingam University for Women, Coimbatore, India
  28. SECURING WIRELESS SENSOR NETWORKS: A SURVEY YUN ZHOU AND YUGUANG FANG, UNIVERSITY OF FLORIDA YANCHAO ZHANG, NEW JERSEY INSTITUTE OF TECHNOLOGYIEEE communication surveys
  29. Routing Protocols in Wireless Sensor Networks Luis Javier Garcaí Villalba *, Ana Lucila Sandoval Orozco, Alicia Triviño Cabrera and Cláudia Jacy Barenco Abbas
Index Terms

Computer Science
Information Sciences

Keywords

Wireless Sensor Network sensor nodes threats attacks solutions security scheme limitations