CFP last date
20 January 2025
Reseach Article

Security Challenges in Wireless Sensor Networks

by Monali Rajput, Usama Ghawte
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 168 - Number 5
Year of Publication: 2017
Authors: Monali Rajput, Usama Ghawte
10.5120/ijca2017914414

Monali Rajput, Usama Ghawte . Security Challenges in Wireless Sensor Networks. International Journal of Computer Applications. 168, 5 ( Jun 2017), 24-28. DOI=10.5120/ijca2017914414

@article{ 10.5120/ijca2017914414,
author = { Monali Rajput, Usama Ghawte },
title = { Security Challenges in Wireless Sensor Networks },
journal = { International Journal of Computer Applications },
issue_date = { Jun 2017 },
volume = { 168 },
number = { 5 },
month = { Jun },
year = { 2017 },
issn = { 0975-8887 },
pages = { 24-28 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume168/number5/27872-2017914414/ },
doi = { 10.5120/ijca2017914414 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:15:20.254696+05:30
%A Monali Rajput
%A Usama Ghawte
%T Security Challenges in Wireless Sensor Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 168
%N 5
%P 24-28
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In recent years, Wireless Sensor Network (WSN) has shown a valid futuristic application in the field of medical, geology, industry and defence etc. The basic plan of a Wireless sensor network(WSN) is to spatially distributed autonomous devices using sensors to monitor physical or environmental conditions. Wireless communication technology exhibits different forms of security threats. [1] This paper introduces numerous security problems in wireless sensor network, by distinguishing various threats and therefore analysing those problems and stating some security measures within the WSN. We additionally discuss the security for making certain layered and robust(strong) security in wireless sensor networks

References
  1. Gaurav Jolly, Mustafa C. KuşÁu, Pallavi Kokate, and Mohamed Younis, Computer Science and Electrical Engineering, University of Maryland- “A Low-Energy Key Management Protocol for Wireless Sensor Networks”.
  2. C. Anuradha, “Stochastic Analysis of Various Security Protocols in Wireless Sensor Networks” Volume 3, Issue 2, February 2013 .
  3. Al-Sakib Khan Pathan, Hyung-Woo Lee, Choong Seon Hong “Security in Wireless Sensor Networks: Issues and Challenges” ISBN 89-5519-129-4, Feb. 20-22, 2006.
  4. Antonio dc la picdra, “Wireless Sensor Networks for Environmental Research: A Survey on Limitations and Challenges” 978-1-4673-2232-4/13.
  5. Chris Karlof, David Wagner- “Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures” Adhoc Networks 1,293-315.
  6. Feng Zhao Wireless Sensor Networks Morgan Kaufmann Publications.
  7. Security in wireless sensor networks (book)
  8. Anthony D. Wood,” Denial of Service in Sensor Networks” http://www.cs.virginia.edu/~adw5p/pubs.html
  9. Ann Holms , Ethan Culler-Mayeno, “A Technical Report: Wireless Sensor Networks and How They Work”
  10. C. Siva Ram Murthy and B.S. Manoj “Building wireless M2M & IoT sensor networks: issues and challenges”
  11. http://www.cs.cmu.edu (Refered for Sybil attack)
  12. https://www.techopedia.com (Refered for DOS attack)
  13. Wireless Sensor Networks and Applications (Book) edited by Ibrahiem M. M. El Emary, S.Ramakrishhnan.
Index Terms

Computer Science
Information Sciences

Keywords

Wireless Sensor Network (WSN) Security.