Security For Wireless Sensor Network

Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 6

Abstract

Wireless sensor network is highly vulnerable to attacks because it consists of various resourceconstrained devices with their low battery power, less memory, and associated low energy. Sensor nodes communicate among themselves via wireless links. However, there are still a lot of unresolved issues in wireless sensor networks of which security is one of the hottest research issues. Sensor networks are deployed in hostile environments. Environmental conditions along with resource-constraints give rise to many type of security threats or attacks. Securely ommunication among sensor nodes is a fundamental challenge for providing security services in WSNs. This paper gives the security of wireless sensor network and attack at different layered architecture of WSN and their prevention.

Authors and Affiliations

Saurabh Singh , Dr. Harsh Kumar Verma

Keywords

Related Articles

FEATURE BASED IMAGE OPTIMIZATION TECHIQUE

The motivation behind the production of high resolution images is to increase the quality and the visual presentation of a digital image. The erstwhile analogue images captured by the silver Bromide film was having infin...

PERFORMANCE EVALUATION OF DSR USING A NOVEL APPROACH

In this paper, we propose a novel approach “Routing based on Best First Search Technique (RBFS)” to improve the erformance of Dynamic Source Routing (DSR) for mobile d-hoc wireless networks. The proposed scheme tries t...

Recoverable Timestamping Approach For Concurrency Control In Distributed Database

A distributed database consists of different number of sites which are interconnected by a communication network. In this environment in absence of proper synchronization among different transaction may lead to inconsist...

Hamiltonian cycle and TSP: A backtracking approach

Backtracking is one of the strategies to reduce the complexity of a problem. Backtracking mainly useful when there is a no solution by going forward in that direction so we required backtracking from it to reduce the com...

Algorithm for Solving Job Shop Scheduling Problem Based on machine availability constraint

Typically, general job shop scheduling problems assume that working times of machines are equal, for instance eight hours a day. However, in real factories, these working times are different because the machines may have...

Download PDF file
  • EP ID EP155409
  • DOI -
  • Views 102
  • Downloads 0

How To Cite

Saurabh Singh, Dr. Harsh Kumar Verma (2011). Security For Wireless Sensor Network. International Journal on Computer Science and Engineering, 3(6), 2393-2399. https://europub.co.uk/articles/-A-155409