Abstract
The sensor nodes are independent and work as sender, receiver and intermediate node in Wireless Sensor Network (WSN). The sensor nodes are forming the small network in which the one or more sender is sending data to one destination/s through intermediate nodes or sending information to Base Station (BS). The information collect by base station is further analyzed. The nodes are also static or mobile depends on the situation or conditions. The connection establishment and data sending is possible through routing protocols of WSN. The routing protocols of WSN are not same as traditional wireless routing protocols. One major issue on this network is security. The routing protocols are sending information to destination from particular source and the routing strategy is provides the better way of delivery in the network. The sensor nodes in network are performing through limited battery supply called node energy or power. The attacker are also affected the limited energy resource. In this paper the center of consideration is on the security issues related to WSN routing protocols. The routing in WSN remains a key issue because of that without accurately functioning of routing protocols, the network cleanly will not work the technique it's intended to. Unfortunately, routing also one of the most difficult to protect against attacks malicious activities because of the administration in WSN. The better protection scheme is provides the complete security from attacks and the secure routing is provides the better and trustful network performance.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.