Abstract
WSN is one of the dominant and emerging technology that shows great promise for various application in military, ecological and health related areas.WSN is highly vulnerable to attacks and inclusion of wireless communication technology incurs various types of security threats.WSN requires security measures due to sensitive data and as sensor may operate in hostile unattended environment.WSN suffer from constraints like low computational capability, small memory limited energy resources physical capture susceptibility and insecure wireless communication channel. These create security a challenge in WSN. In this article we provide a survey of security in WSN.We provide an outline with constraints and security requirement and attacks with their counter measures in WSN.
Highlights
Wirless sensor networks (WSN) are emerging to solve many problems related to networking,security and social factors
In order to understand the security aspects of WSN, we provide a brief description of the different attacks and present the possible solutions
We present some of the typical attacks on WSN security and lastly we describe some well-known mechanisms for preventing some the attacks
Summary
Wirless sensor networks (WSN) are emerging to solve many problems related to networking ,security and social factors. Idea behind sensor network is to distribute sensor devices in an area to sense any change related to different parameter and communicate those changes or incident to other devices. In WSN transreceivers are used for communicating between sensors. As WSN is progressing, security factor related to WSN is becoming crucial and new challenges are introduced in WSN day-by- day. Sensor data can be attacked externally and internally. Sensor can be captured physically and data can modify or new message can be transmitted or message can be leaked/used .WSN is more susceptible to Dos(Denial-ofservice) attack.Dos attack is performed for disturbing or destroying network and to create problem in service providing
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.