International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 107 | Views: 272

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 5, May 2014 | Popularity: 6.7 / 10


     

A Review on Security Challenges and Attacks in Wireless Sensor Networks

Paramjit Kour, Lal Chand Panwar


Abstract: Wireless Sensor Network is emerging technology with their limited energy; computation; and communication capabilities. In contrast to traditional networks; wireless sensor networks are set out in penetrable areas and interact closely with the physical environment; results in increasing the risk of physical attacks; because of these reasons current security mechanisms are inadequate in WSN. In order to facilitate applications that require packet delivery from one or multiple senders to one or multiple receivers must need appropriate security methods. In this paper; we present the review of attacks and security challenges in Wireless sensor networks. First we outline the security constraints; goals; and then attacks with their corresponding prevention and detection mechanisms. At the end we present a comprehensive view of security threats and the layers affected.


Keywords: Security, Attacks, sensor, networks, DOS, WSN


Edition: Volume 3 Issue 5, May 2014


Pages: 1360 - 1364



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Paramjit Kour, Lal Chand Panwar, "A Review on Security Challenges and Attacks in Wireless Sensor Networks", International Journal of Science and Research (IJSR), Volume 3 Issue 5, May 2014, pp. 1360-1364, https://www.ijsr.net/getabstract.php?paperid=20132027, DOI: https://www.doi.org/10.21275/20132027



Similar Articles

Downloads: 5 | Weekly Hits: ⮙4 | Monthly Hits: ⮙4

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 1, January 2024

Pages: 516 - 519

I-Vote Android Application for Internet-Voting

Rahul Kumar, Hima Saxena, Dr. Suman Sharma

Share this Article

Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Downloads: 160 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Downloads: 137 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar, Mohan K

Share this Article

Downloads: 0

Student Project, Computer Science & Engineering, India, Volume 11 Issue 1, January 2022

Pages: 455 - 459

Real World IoT Applications in Daily Domain

Eega Vivek Reddy, J Bala Krishna, Huzaifa Saad

Share this Article
Top