slugReview on Security in Wireless Sensor Network

Abstract

Wireless Sensor Networks (WSN) is an emerging and one of the dominant technology trends in the upcoming decades has posed many potential applications and numerous unique challenges to researches. These networks consist of hundreds or potentially thousands of small sized, low power, low cost and self-organizing sensor nodes which are highly distributed in hard accessible terrains. Due to their deployment in open environments, unattended nature, resource constraints, wireless and shared communication, un-trusted and broadband transmissions between them, WSNs are prone to different types of attacks. Thus, security is a crucial requirement in WSNs which is a very difficult task to implement. In this paper, we focus on some security issues and different types of attacks in sensor networks. This paper also discusses some security detection approaches and defensive mechanisms against these attacks efficiently.

Authors and Affiliations

Apeksha Malik, Archit Kumar

Keywords

Related Articles

Insurance Fraud Detection Using Big Data Analytics

The volume of data available to businesses from both internal systems and external channels has led to a new category of application known as “Big Data”. For insurers, the benefits of using analytical applications that...

Mathematical Based Model on Survivability for WDM Networks

Survivability is a new field of research, and is viewed by many as distinct from the traditional areas of security and fault-tolerance. Survivability is the ability of any system to continuously withstand its adequate p...

Trust Based Novel Recommendation Regularized with Item Ratings

Recommendation is an opinion given by an analyst to his/her client whether the given stock is worth buying or a particular place is worth visiting or not. They use various projections as a basis for issuing recommendati...

Prediction of Blast Loading and Its Effects on Waffle Slab

Explosions are occurring in recent days which cause total destruction of structure. Blast explosions caused due to gas leakage, bomb attacks, terrorist attack, nuclear explosions etc. Studies were conducted on the behav...

Implementation of Centralized Logging Feature Using Web Services

Data logging is the technique that involves gathering of log data from one or more applications which produces persistent results at runtime with less effort. This paper describes the server side storage of log data eve...

Download PDF file
  • EP ID EP17819
  • DOI -
  • Views 320
  • Downloads 11

How To Cite

Apeksha Malik, Archit Kumar (2014). slugReview on Security in Wireless Sensor Network. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 2(4), -. https://europub.co.uk/articles/-A-17819