TAXONOMY FOR WSN SECURITY-A SURVEY

Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2013, Vol 4, Issue 2

Abstract

WSN is one of the dominant and emerging technology that shows great promise for  various application in military, ecological and health related areas.WSN is highly vulnerable to attacks and inclusion of wireless communication technology incurs various types of security threats.WSN requires security measures due to sensitive data and as sensor may operate in hostile unattended environment.WSN suffer from constraints like low computational capability, small memory limited energy resources physical capture susceptibility and insecure wireless communication channel. These create security a challenge in WSN. In this article we provide a survey of security in WSN.We provide an outline with constraints and security requirement and attacks with their counter measures in WSN.

Authors and Affiliations

Kshitija Ajabrao Chaple

Keywords

Related Articles

ANALYSIS OF SOM & SOFM TECHNIQUES USED IN SATELLITE IMAGERY

This paper describes the introduction of Supervised and Unsupervised Techniques with the comparison of SOFM (Self Organized Feature Map) used for Satellite Imagery. In this we have explained the way of spatial and tempor...

Advantage of Collaboration Workflows in the Automotive Supply Chain: Case Study on the Automotive Cluster of Slovenia

Strengthening of collaboration among individual business partners has proved essential for the structuring of Slovenian economy and enhancing competitive advantage on the global market. At the same time, ontology, as an...

An Instance Selection Algorithm Based On Reverse k Nearest Neighbor

Classification is one of the most important data mining techniques. It belongs to supervised learning. The objective of classification is to assign class label to unlabelled data. As data is growing rapidly, handling it...

Data Mining as Support for Customer Relationship Management: A Case Study

This article describes the data mining application to CRM - Customer Relationship Management. The article starts with an introduction showing the importance of the CRM strategy for the company, after it’s introduced th...

Frequency Analysis of 32-bit Modular Divider Based on Extended GCD Algorithm for Different FPGA chips

Modular inversion with large integers and modulus is a fundamental operation in many public-key cryptosystems. Extended Euclidean algorithm (XGCD) is an extension of Euclidean algorithm (GCD) used to compute the modular...

Download PDF file
  • EP ID EP650016
  • DOI 10.24297/ijct.v4i2C1.4175
  • Views 73
  • Downloads 0

How To Cite

Kshitija Ajabrao Chaple (2013). TAXONOMY FOR WSN SECURITY-A SURVEY. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY, 4(2), 580-582. https://europub.co.uk/articles/-A-650016