A Survey of Wireless Sensor Network Security

Authors

  • Monika Soni Research scholar, Madhyanchal Professional University Bhopal
  • Dr. Vaseem Naiyer Asst. Professor, Madhyanchal Professional University Bhopal

Keywords:

Wireless sensor network, security, information, network topologies, network security, data, hiding text, scrambled text, cryptography

Abstract

In the paper we have discussed about Wireless sensor network and its design anddevelopment aspects while keeping security of information into mind. From the primary informationpoint-of-view we discussed about network and wireless sensor network, primary characteristics of WSN.Different network topologies are explained in this paper and need of network security while sending andreceiving data is also explained. The art of hiding text in some scrambled text is also explained into thispaper under the section cryptography.

References

Chong, Chee-Yee, and Srikanta P. Kumar. "Sensor networks: evolution, opportunities, and challenges." Proceedings of the IEEE 91.8 (2003): 1247-1256.

Groth, David (2005). Network Study Guide, Fourth Edition'. Sybex, Inc. ISBN 0-7821-4406-3

Rathee, Pinki, and Sanjeev Indora. "An Object Tracking Mechanism in Wireless Sensor Networks." (2017).

López, J. and Zhou, J. eds., 2008. Wireless sensor network security (Vol. 1). Ios Press.

Walters, John Paul, et al. "Wireless sensor network security: A survey." Security in distributed, grid, mobile, and pervasive computing 1 (2007): 367.

William Stallings, “Cryptography and Network Security Principle and Practices, Fourth Edition”, ISBN0-14-187316-4

R. Stockton Gaines, “Using Encryption for Authentication in Large Network of Computers”,

“Wireless Sensor Networks Concepts, Application, Experimentation and Analysis”, Fahmy, H.M.A., 2016, ISBN: 978-981-10-0411-7,

R. Stockton Gaines, “Communication of ACM”, December 178, Volume 21, Number 12, pp.993-998

Simmons, Gustavus J. "Symmetric and asymmetric encryption." ACM Computing Surveys (CSUR) 11, no. 4 (1979): 305-330.

Downloads

Published

2023-07-01

How to Cite

[1]
“A Survey of Wireless Sensor Network Security”, JASRAE, vol. 20, no. 3, pp. 263–266, Jul. 2023, Accessed: Sep. 29, 2024. [Online]. Available: https://ignited.in/index.php/jasrae/article/view/14489

How to Cite

[1]
“A Survey of Wireless Sensor Network Security”, JASRAE, vol. 20, no. 3, pp. 263–266, Jul. 2023, Accessed: Sep. 29, 2024. [Online]. Available: https://ignited.in/index.php/jasrae/article/view/14489