Downloads: 134 | Views: 257
Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 3, March 2014 | Popularity: 6.2 / 10
A Study on Threats in Wireless Sensor Networks
Muruganandam. A, Bagyalakshmi. P
Abstract: Wireless Sensor Networks are networked systems, characterized by several energy resources, and the security mechanisms are actually used to detect, prevent and recover from the security attacks. In this security concerns must be addressed from the beginning of the system design. Securely communication among sensor nodes is a fundamental challenge for providing security services in WSNs. There is currently enormous research in the field of Wireless Sensor Network security. In the current research field researches will be benefitted. Several researchers have tried to provide security by using symmetric key cryptography, but thinking that public key steganography are feasible to implement in these networks because they are provided with more resources. In this paper tends to investigate the security related issues and challenges in Wireless Sensor Networks. We identify the security threats for Wireless Sensor Networks and also present the obstacles for the requirements in the sensor security, classification of the current attacks.
Keywords: Wireless Sensor Networks, Security, Attacks, Holistic Security in Wireless Sensor Networks, Challenges
Edition: Volume 3 Issue 3, March 2014
Pages: 413 - 418
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 160 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017
Pages: 868 - 874Study of Power Management in Adhoc Networks
Anandhi Giri, S. K. Srivatsa
Downloads: 137 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 2246 - 2249Packet Analysis with Network Intrusion Detection System
Rashmi Hebbar, Mohan K
Downloads: 0
Research Paper, Computer Science & Engineering, India, Volume 11 Issue 11, November 2022
Pages: 629 - 634A Face Spoof Detection using Feature Extraction and SVM
Lovely Pal, Renuka Singh
Downloads: 0
Research Paper, Computer Science & Engineering, India, Volume 12 Issue 1, January 2023
Pages: 131 - 141Enhancing Fashion Image Retrieval with Multi-Modal Query and Zero-Shot Learning for Cross-Domain
Swathy S
Downloads: 0
Analysis Study Research Paper, Computer Science & Engineering, United States of America, Volume 13 Issue 1, January 2024
Pages: 324 - 329Optimizing Data Centers for Sustainability: The Role of Serverless Fog Computing in Artificial Intelligence
Jatin Pal Singh