International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 134 | Views: 257

Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 3, March 2014 | Popularity: 6.2 / 10


     

A Study on Threats in Wireless Sensor Networks

Muruganandam. A, Bagyalakshmi. P


Abstract: Wireless Sensor Networks are networked systems, characterized by several energy resources, and the security mechanisms are actually used to detect, prevent and recover from the security attacks. In this security concerns must be addressed from the beginning of the system design. Securely communication among sensor nodes is a fundamental challenge for providing security services in WSNs. There is currently enormous research in the field of Wireless Sensor Network security. In the current research field researches will be benefitted. Several researchers have tried to provide security by using symmetric key cryptography, but thinking that public key steganography are feasible to implement in these networks because they are provided with more resources. In this paper tends to investigate the security related issues and challenges in Wireless Sensor Networks. We identify the security threats for Wireless Sensor Networks and also present the obstacles for the requirements in the sensor security, classification of the current attacks.


Keywords: Wireless Sensor Networks, Security, Attacks, Holistic Security in Wireless Sensor Networks, Challenges


Edition: Volume 3 Issue 3, March 2014


Pages: 413 - 418



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Muruganandam. A, Bagyalakshmi. P, "A Study on Threats in Wireless Sensor Networks", International Journal of Science and Research (IJSR), Volume 3 Issue 3, March 2014, pp. 413-418, https://www.ijsr.net/getabstract.php?paperid=20131126, DOI: https://www.doi.org/10.21275/20131126



Similar Articles

Downloads: 160 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Downloads: 137 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar, Mohan K

Share this Article

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 11, November 2022

Pages: 629 - 634

A Face Spoof Detection using Feature Extraction and SVM

Lovely Pal, Renuka Singh

Share this Article

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 12 Issue 1, January 2023

Pages: 131 - 141

Enhancing Fashion Image Retrieval with Multi-Modal Query and Zero-Shot Learning for Cross-Domain

Swathy S

Share this Article

Downloads: 0

Analysis Study Research Paper, Computer Science & Engineering, United States of America, Volume 13 Issue 1, January 2024

Pages: 324 - 329

Optimizing Data Centers for Sustainability: The Role of Serverless Fog Computing in Artificial Intelligence

Jatin Pal Singh

Share this Article



Top