A Review On Security in Wireless Sensor Network

被引:0
|
作者
Kumar, Ranjit [1 ,2 ]
Tripathi, Sachin [1 ]
Agrawal, Rajeev [3 ]
机构
[1] Indian Inst Technol, Indian Sch Mines, Dept Comp Sci & Engn, Dhanbad 826004, Jharkhand, India
[2] GCET, Greater Noida 201306, India
[3] GL BAJAJ Inst Technoloy & Management, Dept Comp Sci, Greater 201306, Noida, India
关键词
WSN; Security; Routing Protocols; cryptography; encryption and decryption;
D O I
10.1109/esci48226.2020.9167610
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Developments to come down with wireless sensor networking (WSN) engineering has furnished the provision of low-cost and small sensor nodes with all the performance of realizing different kinds of environmental and physical problems, capture processing, and then wireless discussion. A variety of realizing abilities leads to big amount of program areas. Nevertheless, the characteristics of WSN call for better effective techniques for stats, forwarding as well as processing. Inside WSN, the sensor nodes provide an insufficient transmission stove, as well as the processing of theirs as well as storage space abilities in addition to their toughness resources likewise are restricted. Routing protocols for WSNs are actually likely for sustaining the routes within the networking and also need to create particular dependable multi hop communique below the circumstances. With this newspaper, we provide a survey of routing protocols for WSN and also look at their laws and strengths. We talked about a variety of protection methods as decryption as well as encryption of information to safeguard it coming from malicious people.
引用
收藏
页码:304 / 308
页数:5
相关论文
共 50 条
  • [41] ESF: an efficient security framework for wireless sensor network
    Tripathy, Somanath
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2013, 10 (02) : 176 - 194
  • [42] Double Guarantee for Security Localization in Wireless Sensor Network
    Gu, Jingjing
    Chen, Songcan
    Zhuang, Yi
    ICWMC: 2009 FIFTH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMMUNICATIONS, 2009, : 99 - 104
  • [43] Optimization of Wireless Sensor Network Architecture with Security System
    Wang, Shanshan
    Chen, Yun
    JOURNAL OF SENSORS, 2021, 2021 (2021)
  • [44] Challenges and Potential Approaches in Wireless Sensor Network Security
    Sumit Suhag
    Journal of Electrical Engineering & Technology, 2024, 19 : 2693 - 2700
  • [45] Challenges and Potential Approaches in Wireless Sensor Network Security
    Suhag, Sumit
    Aarti
    JOURNAL OF ELECTRICAL ENGINEERING & TECHNOLOGY, 2024, 19 (04) : 2693 - 2700
  • [46] A Security Approach for Wireless Sensor Network in Agriculture Industry
    Techateerawat, Piya
    INTERNATIONAL TRANSACTION JOURNAL OF ENGINEERING MANAGEMENT & APPLIED SCIENCES & TECHNOLOGIES, 2013, 4 (04): : 269 - 282
  • [47] Energy conserving security mechanism for wireless sensor network
    Hamid, Md. Abdul
    Rahman, Md. Mustafizur
    Hong, Choong Seon
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006, PT 2, 2006, 3981 : 866 - 875
  • [48] Wireless Sensor Network Simulation for Security and Performance Analysis
    Diaz, A.
    Sanchez, P.
    Sancho, J.
    Rico, J.
    DESIGN, AUTOMATION & TEST IN EUROPE, 2013, : 432 - 435
  • [49] SCA security verification on wireless sensor network node
    He, Wei
    Pizarro, Carlos
    de la Torre, Eduardo
    Portilla, Jorge
    Riesgo, Teresa
    VLSI CIRCUITS AND SYSTEMS V, 2011, 8067
  • [50] Research of security routing technology in wireless sensor network
    Wu, Jixiang
    Sensors and Transducers, 2013, 23 (SPEC.ISSUE): : 152 - 156