International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Since Year 2012 | Open Access | Double Blind Reviewed

ISSN: 2319-7064




Downloads: 119

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 10, October 2014


Protocols Security for Wireless Sensor Networks

Parli B. Hari | Monika [81]


Abstract: As wireless sensor networks are growing fast so they need for effective security mechanisms as well. Sensor networks interact with sensitive data and operate in a hostile unattended environment, hence security concerns be addressed from the beginning of the network design. Due to resource and computing constraints, the biggest challenge in sensor network is to provide security in routing protocols. Many sensor network routing protocol have been proposed, but a very few have been designed with security as a goal. Asymmetric cryptographic algorithms are not suitable for sensor network providing security, as sensor nodes has limited computation, power and storage resources. On the other hand, it is not feasible to replace the batteries of thousands of sensor nodes, hence sensing, computing and communication protocols must be made as energy efficient as possible. There is currently enormous research potential in the field of wireless sensor network security. Thus, we need to be familiar with the current research in this field.


Keywords: security, attacks, integrity, authentication, confidentiality


Edition: Volume 3 Issue 10, October 2014,


Pages: 1231 - 1234


How to Cite this Article?

Parli B. Hari, Monika, "Protocols Security for Wireless Sensor Networks", International Journal of Science and Research (IJSR), Volume 3 Issue 10, October 2014, pp. 1231-1234, https://www.ijsr.net/get_abstract.php?paper_id=OCT14686

How to Share this Article?

Enter Your Email Address




Similar Articles with Keyword 'security'

Downloads: 123 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena [3] | A. Komathi [2]

Share this Article

Downloads: 137 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar | Mohan K [15]

Share this Article


Top