International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 107

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 5, May 2014


A Review on Security Challenges and Attacks in Wireless Sensor Networks

Paramjit Kour | Lal Chand Panwar


Abstract: Wireless Sensor Network is emerging technology with their limited energy; computation; and communication capabilities. In contrast to traditional networks; wireless sensor networks are set out in penetrable areas and interact closely with the physical environment; results in increasing the risk of physical attacks; because of these reasons current security mechanisms are inadequate in WSN. In order to facilitate applications that require packet delivery from one or multiple senders to one or multiple receivers must need appropriate security methods. In this paper; we present the review of attacks and security challenges in Wireless sensor networks. First we outline the security constraints; goals; and then attacks with their corresponding prevention and detection mechanisms. At the end we present a comprehensive view of security threats and the layers affected.


Keywords: Security, Attacks, sensor, networks, DOS, WSN


Edition: Volume 3 Issue 5, May 2014,


Pages: 1360 - 1364


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Paramjit Kour, Lal Chand Panwar, "A Review on Security Challenges and Attacks in Wireless Sensor Networks", International Journal of Science and Research (IJSR), Volume 3 Issue 5, May 2014, pp. 1360-1364, https://www.ijsr.net/get_abstract.php?paper_id=20132027

Similar Articles with Keyword 'Security'

Downloads: 5 | Weekly Hits: ⮙4 | Monthly Hits: ⮙4

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 1, January 2024

Pages: 516 - 519

I-Vote Android Application for Internet-Voting

Rahul Kumar [11] | Hima Saxena [2] | Dr. Suman Sharma [5]

Share this Article

Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena [3] | A. Komathi [2]

Share this Article
Top