TAXONOMY FOR WSN SECURITY-A SURVEY

Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2013, Vol 4, Issue 2

Abstract

WSN is one of the dominant and emerging technology that shows great promise for  various application in military, ecological and health related areas.WSN is highly vulnerable to attacks and inclusion of wireless communication technology incurs various types of security threats.WSN requires security measures due to sensitive data and as sensor may operate in hostile unattended environment.WSN suffer from constraints like low computational capability, small memory limited energy resources physical capture susceptibility and insecure wireless communication channel. These create security a challenge in WSN. In this article we provide a survey of security in WSN.We provide an outline with constraints and security requirement and attacks with their counter measures in WSN.

Authors and Affiliations

Kshitija Ajabrao Chaple

Keywords

Related Articles

A tool for prototyping a precision GPS system

The GPS allows locating an object in any part of the World with a certain degree of accuracy. Some precision activities need to operate with a sub-metric level of accuracy. This paper introduces a data analysis tool to p...

OPTIMIZATION OF CHANNEL ALLOCATION ALGORITHM FOR HOT SPOT CELLS IN WIRELESS NETWORKS

Dense deployment of cellular networks is leading to scarcity of communication bandwidth or what we call as channel. If compared to its wired counterparts, wireless cellular network have limited number of channels availab...

A Survey of Mining Association Rules Using Constraints

As we all know that association rule is used to find out the rules that are associated with the items present in the database that satisfy user specified support and confidence. There are many algorithms for mining assoc...

Robust Singular Value Decomposition Algorithm for Unique Faces

It has been read and also seen by physical encounters that there found to be seven near resembling humans by appearance .Many a times one becomes confused with respect to identification of  such near resembling faces wh...

Congestion Control in Computer Networks with a New Hybrid Intelligent Algorithm

With invention of computer networks, transferring data from one computer to another became possible, but as the number of computers that transfer data to each other increased and common communication channel bandwidth am...

Download PDF file
  • EP ID EP650016
  • DOI 10.24297/ijct.v4i2C1.4175
  • Views 99
  • Downloads 0

How To Cite

Kshitija Ajabrao Chaple (2013). TAXONOMY FOR WSN SECURITY-A SURVEY. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY, 4(2), 580-582. https://europub.co.uk./articles/-A-650016