Survey on Security aspect of WSN

نویسندگان

  • Gaurish Edake
  • Ganesh Pathak
چکیده

Recently, the tremendous growth in processor, memory, and wireless technology have enabled the development of distributed networks of small, lightweight and cost effective nodes that are capable of sensing the data, computing according to need. Wireless sensor networks (WSNs) are collections of a large amount of small devices equipped with integrated sensing and wireless communication capabilities [3]. These are considered as a special case of ad hoc networks with reduced mobility. Sensor networks share some important characteristics with ad hoc networks, for example they share the need for self-organization, wireless multi-hop operation, and time-variability in topology. The sensor networks are expected to find widespread use in a variety of applications. Environmental monitoring, condition based maintenance, habitat monitoring, seismic detection, military surveillance, inventory tracking, smart spaces etc are some examples. Designing wireless networks with strict layering principle did not fulfil the expectation raised in wire line network design. Due to dynamic nature, infrastructure less architecture, limited resources, mobility of nodes and time varying unstable links and topology, the ad hoc mobile networks oppose strict layered

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security Vulnerabilities In Wireless Sensor Networks: A Survey

The significant advances of hardware manufacturing technology and the development of efficient software algorithms make technically and economically feasible a network composed of numerous, small, low-cost sensors using wireless communications, that is, a wireless sensor network (WSN). Security is becoming a major concern for WSN protocol designers because of the wide security-critical applicat...

متن کامل

Secure Energy Efficient Routing in Wireless Sensor Network-A Survey on Existing Techniques

Wireless Sensor Network are special kind of Ad-hoc networks. There are number of application for wireless sensor networks like military, healthcare and civil areas and security is important for many of them. However WSN suffers from many constraints like low computation capability, small memory, limited energy resources, lack of infrastructure which impose security challenge. Traditional securi...

متن کامل

A Survey on Wireless Sensor Networks Security with the Integration of Clustering and Keying Techniques

Keying technique in Wireless Sensor Networks(WSNs) is one of the most emerging fields of WSN security. In order to provide security on WSN, the role of Key distribution technique is considered to be very significant and thus the key management plays a crucial and fundamental roles in the security service of WSNs. This paper reviews pairwise key establishment technique along with the architectur...

متن کامل

Survey on Various Key Management Schemes for LEACH in Wireless Sensor Networks

Wireless Sensor Network (WSN) are the network of sensor nodes which communicate with each other and with the base station using wireless channel. Due to extensive use of wireless sensor networks it is necessary to improve its security. WSN nodes are prone to physical attacks. Wireless sensor networks (WSN) face security threats so traditional key management schemes are no longer accurate for WS...

متن کامل

Security Model for Hierarchical Clustered Wireless Sensor Networks

The proposed security system for the Wireless Sensor Network (WSN) is based on the WSN security design goal that ‘to design a completely secure WSN, security must be integrated into every node of the system’. This paper discusses on two main components of the security framework viz. the secure key management module and the secure routing scheme. The incorporation of security mechanism during th...

متن کامل

Hoc Sensor Networks for Port Security Final Report

i Disclaimer The contents of this report reflect the views of the authors, who are responsible for the facts and the accuracy of the information presented herein. This document is disseminated under the sponsorship of the Transportation assume no liability for the contents or use thereof. The contents do not necessarily reflect the official views or policies of the State of California or the De...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013