A Review On Security in Wireless Sensor Network

被引:0
|
作者
Kumar, Ranjit [1 ,2 ]
Tripathi, Sachin [1 ]
Agrawal, Rajeev [3 ]
机构
[1] Indian Inst Technol, Indian Sch Mines, Dept Comp Sci & Engn, Dhanbad 826004, Jharkhand, India
[2] GCET, Greater Noida 201306, India
[3] GL BAJAJ Inst Technoloy & Management, Dept Comp Sci, Greater 201306, Noida, India
关键词
WSN; Security; Routing Protocols; cryptography; encryption and decryption;
D O I
10.1109/esci48226.2020.9167610
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Developments to come down with wireless sensor networking (WSN) engineering has furnished the provision of low-cost and small sensor nodes with all the performance of realizing different kinds of environmental and physical problems, capture processing, and then wireless discussion. A variety of realizing abilities leads to big amount of program areas. Nevertheless, the characteristics of WSN call for better effective techniques for stats, forwarding as well as processing. Inside WSN, the sensor nodes provide an insufficient transmission stove, as well as the processing of theirs as well as storage space abilities in addition to their toughness resources likewise are restricted. Routing protocols for WSNs are actually likely for sustaining the routes within the networking and also need to create particular dependable multi hop communique below the circumstances. With this newspaper, we provide a survey of routing protocols for WSN and also look at their laws and strengths. We talked about a variety of protection methods as decryption as well as encryption of information to safeguard it coming from malicious people.
引用
收藏
页码:304 / 308
页数:5
相关论文
共 50 条
  • [31] Application of Wireless Sensor System on Security Network
    Oh, Sechang
    Kwon, Hyeokjun
    Yoon, Hargsoon
    Varadan, Vijay K.
    NANOSENSORS, BIOSENSORS, AND INFO-TECH SENSORS AND SYSTEMS 2010, 2010, 7646
  • [32] Experimental study on wireless sensor network security
    Kwon, Taekyoung
    Park, Sang-Ho
    INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 3975 : 741 - 743
  • [33] Wireless Sensor Network Security: A Comprehensive Overview
    Ozdemir, Suat
    JOURNAL OF POLYTECHNIC-POLITEKNIK DERGISI, 2008, 11 (03): : 207 - 214
  • [34] Security Estimation in Wireless Sensor Network Simulator
    Diaz, Alvaro
    Gonzalez-Bayon, Javier
    Sanchez, Pablo
    JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2016, 25 (07)
  • [35] Security Proposal for AMI Network on a Industrial Wireless Sensor Network
    Lazo, C.
    Mardones, J.
    Diaz, R.
    2015 CHILEAN Conference on Electrical, Electronics Engineering, Information and Communication Technologies (CHILECON), 2015, : 333 - 338
  • [36] Security of Intelligent Building Network Based on Wireless Sensor Network
    Xu, Shuang
    Zhou, Tong
    INTERNATIONAL JOURNAL OF ONLINE ENGINEERING, 2018, 14 (06) : 151 - 164
  • [37] Network security analysis on diseases reporting at wireless sensor network
    Zhang, Yanling
    Ting, Zhang
    INTERNATIONAL JOURNAL OF NANOTECHNOLOGY, 2024, 21 (06) : 423 - 436
  • [38] Review of Security for Underwater Wireless Sensor Networks
    Su, Yishan
    Zhang, Hehe
    Zhang, Rui
    Ma, Suya
    Fan, Rong
    Fu, Xiaomei
    Jin, Zhigang
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2023, 45 (03) : 1121 - 1133
  • [39] Security of Industrial Wireless Sensor Networks : A Review
    Sheela, S. J.
    Suresh, K., V
    Tandur, Deepaknath
    2015 INTERNATIONAL CONFERENCE ON TRENDS IN AUTOMATION, COMMUNICATIONS AND COMPUTING TECHNOLOGY (I-TACT-15), 2015,
  • [40] Wireless sensor network security: A recent review based on state-of-the-art works
    Faris, Mohammed
    Mahmud, Mohd Nazri
    Salleh, Mohd Fadzli Mohd
    Alnoor, Alhamzah
    INTERNATIONAL JOURNAL OF ENGINEERING BUSINESS MANAGEMENT, 2023, 15