Security Issues in Wireless Sensor Networks

Anil Dattatraya Nimbalkar*, Azmat Ali**, Y. M. Patil***
* Kolhapur Institute of Technology's College of Engineering (Autonomous), Kolhapur, Maharashtra, India.
** Institute of Engineering and Technology, Dr. Rammanohar Lohia Avadh University, Ayodhya, Uttar Pradesh, India.
*** KIT's College of Engineering (Autonomous), Kolhapur (M.S.), Maharashtra, India.
Periodicity:January - June'2023
DOI : https://doi.org/10.26634/jwcn.11.2.19780

Abstract

The main purpose of Wireless Sensor Networks (WSNs) is to collect data from unsafe environments. Almost all WSN security protocols assume that an adversary may gain complete control of a sensor node through direct physical access. As sensor networks emerge as a key technology in the future, researchers have faced a number of challenges. A wireless sensor network is made up of many tiny sensor nodes that operate independently and, in some cases, have no access to renewable energy sources. Additionally, as security is essential to the acceptability and use of sensor networks for a variety of applications, there are a number of challenges with sensor networks. This research focuses on the issues in Wireless Sensor Networks.

Keywords

Layering-Based Attacks, Wireless Sensor Network Security Concerns, Wireless Sensor Network Attack, Wireless Sensor Network Cryptography

How to Cite this Article?

Nimbalkar, A. D., Ali, A., and Patil, Y. M. (2023). Security Issues in Wireless Sensor Networks. i-manager’s Journal on Wireless Communication Networks, 11(2), 32-38. https://doi.org/10.26634/jwcn.11.2.19780

References

[1]. Apostolos, P. (2009). Cryptography and security in wireless sensor networks. FRONTS 2nd Winterschool Braunschweig, Germany (pp. 1-42).
[5]. Fernandes, L. L., Siahaan, I. S. R., & Passarone, R. (2007). Secure routing in wireless sensor networks. Report University of Trento.
[10]. Kalita, H. K., & Kar, A. (2009). Wireless sensor network security analysis. International Journal of Next-Generation Networks (IJNGN), 1(1), 1-10.
[12]. Modares, H. (2009). A Scalar Multiplication in Elliptic Curve Cryptography with Binary Polynomial Operations in Galois Field (Doctoral dissertation, University of Malaya).
[13]. Muraleedharan, R., & Osadciw, L. A. (2003). Balancing the performance of a sensor network using an ant system. Electrical Engineering and Computer Science.
[15]. Perrig, A., Szewczyk, R., Tygar, J., Wen, V., & Culler, D. E. (2002). SPINS: Security protocols for sensor networks. Wireless Networks, 8, 521-534.
[17]. Prabhudutta, M., Sangram, P., Nityananda, S., & Satapathy, S. S. (2010). Security issues in wireless sensor network data gathering protocols: a survey. Journal of Theoretical & Applied Information Technology, 13, 14-27.
[18]. Walters, J. P., Liang, Z., Shi, W., & Chaudhary, V. (2007). Wireless sensor network security: A survey. In Security in Distributed, Grid, Mobile, and Pervasive Computing (pp. 367-409). Auerbach Publications.
[21]. Yoneki, E., & Bacon, J. (2005). A Survey of Wireless Sensor Network Technologies: Research Trends and Middleware's Role. University of Cambridge Computer Laboratory.
[22]. Zia, T., & Zomaya, A. (2006, February). A security framework for wireless sensor networks. In Proceedings of the IEEE Sensors Applications Symposium (pp. 49-53).
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.