A survey of security in wireless sensor networks
- 1 February 2017
- conference paper
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE) in 2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT)
Abstract
Wireless sensor networks are spatially distributed sensor nodes that keeps the track of the physical or environmental conditions like sound, stress waves, temperature of surrounding etc, and also send the sensed data back to the sink or base station. WSN are used in many applications like military areas, disaster management in remote areas, in building smart cities etc. Therefore security is an important aspect in WSN. These networks can be prone to various disastrous attacks or hackers that has the motive to disrupt the entire network. In this article, various aspects of security in Wireless Sensor Networks has been observed like secure routing protocols, security at the node level in the network, cryptography etc.Keywords
This publication has 17 references indexed in Scilit:
- LSCD: A Low-Storage Clone Detection Protocol for Cyber-Physical SystemsIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2016
- Adaptive and Channel-Aware Detection of Selective Forwarding Attacks in Wireless Sensor NetworksIEEE Transactions on Wireless Communications, 2016
- Detecting DoS attacks in WSN based on clustering techniquePublished by Institute of Electrical and Electronics Engineers (IEEE) ,2013
- Emergent properties in ad-hoc networksPublished by Association for Computing Machinery (ACM) ,2006
- LKHW: a directed diffusion-based secure multicast scheme for wireless sensor networksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- LEAPPublished by Association for Computing Machinery (ACM) ,2003
- Instrumenting the world with wireless sensor networksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- The RC5 encryption algorithmLecture Notes in Computer Science, 1995
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1983
- New directions in cryptographyIEEE Transactions on Information Theory, 1976