Security Issues in Wireless Sensor Network - A Review

被引:0
作者
Grover, Jitender [1 ]
Sharma, Shikha [2 ]
机构
[1] MM Univ, Dept Comp Sci & Engn, Ambala, India
[2] IEEE Delhi Sect, Delhi, India
来源
2016 5TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (TRENDS AND FUTURE DIRECTIONS) (ICRITO) | 2016年
关键词
WSN; Security; Threats; Security Protocols;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Wireless Sensor Networks (WSNs) are formed by deploying as large number of sensor nodes in an area for the surveillance of generally remote locations. A typical sensor node is made up of different components to perform the task of sensing, processing and transmitting data. WSNs are used for many applications in diverse forms from indoor deployment to outdoor deployment. The basic requirement of every application is to use the secured network. Providing security to the sensor network is a very challenging issue along with saving its energy. Many security threats may affect the functioning of these networks. WSNs must be secured to keep an attacker from hindering the delivery of sensor information and from forging sensor information as these networks are build for remote surveillance and unauthorized changes in the sensed data may lead to wrong information to the decision makers. This paper studies the various security issues and security threats in WSNs. Also, gives brief description of some of the protocols used to achieve security in the network. This paper also compares the proposed methodologies analytically and demonstrates the findings in a table. These findings can be used further by other researchers or Network implementers for making the WSN secure by choosing the best security mechanism.
引用
收藏
页码:397 / 404
页数:8
相关论文
共 46 条
  • [1] Agnihotri Ram Bhushan, 2015, 2015 4th International Conference on Reliability, Infocom Technologies and Optimization (ICRITO) (Trends and Future Directions), P1, DOI 10.1109/ICRITO.2015.7359295
  • [2] Ahlawat Jyoti, 2012, INT J COMPUTER SCI C, P66
  • [3] [Anonymous], P IEEE INT C DEV COM
  • [4] [Anonymous], GREEN CHEM
  • [5] [Anonymous], 2014, IOSR J COMPUTER ENG
  • [6] Anwar R.W., 2014, World Applied Sciences Journal, V30, P1224
  • [7] Enhanced Security Protocol in Wireless Sensor Networks
    Aseri, T. C.
    Singla, N.
    [J]. INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, 2011, 6 (02) : 214 - 221
  • [8] Burgner Daniel E., 2011, Proceedings of the 2011 Eighth International Conference on Information Technology: New Generations (ITNG), P315, DOI 10.1109/ITNG.2011.62
  • [9] Node Scheduling Control Inspired by Epidemic Theory for Data Dissemination in Wireless Sensor-Actuator Networks With Delay Constraints
    Byun, Heejung
    So, Jungmin
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2016, 15 (03) : 1794 - 1807
  • [10] Gagandeep, 2012, INT J COMPUTER SCI E, V4, P1078