A Survey of Wireless Sensor Network Security
Keywords:
Wireless sensor network, security, information, network topologies, network security, data, hiding text, scrambled text, cryptographyAbstract
In the paper we have discussed about Wireless sensor network and its design anddevelopment aspects while keeping security of information into mind. From the primary informationpoint-of-view we discussed about network and wireless sensor network, primary characteristics of WSN.Different network topologies are explained in this paper and need of network security while sending andreceiving data is also explained. The art of hiding text in some scrambled text is also explained into thispaper under the section cryptography.References
Chong, Chee-Yee, and Srikanta P. Kumar. "Sensor networks: evolution, opportunities, and challenges." Proceedings of the IEEE 91.8 (2003): 1247-1256.
Groth, David (2005). Network Study Guide, Fourth Edition'. Sybex, Inc. ISBN 0-7821-4406-3
Rathee, Pinki, and Sanjeev Indora. "An Object Tracking Mechanism in Wireless Sensor Networks." (2017).
López, J. and Zhou, J. eds., 2008. Wireless sensor network security (Vol. 1). Ios Press.
Walters, John Paul, et al. "Wireless sensor network security: A survey." Security in distributed, grid, mobile, and pervasive computing 1 (2007): 367.
William Stallings, “Cryptography and Network Security Principle and Practices, Fourth Edition”, ISBN0-14-187316-4
R. Stockton Gaines, “Using Encryption for Authentication in Large Network of Computers”,
“Wireless Sensor Networks Concepts, Application, Experimentation and Analysis”, Fahmy, H.M.A., 2016, ISBN: 978-981-10-0411-7,
R. Stockton Gaines, “Communication of ACM”, December 178, Volume 21, Number 12, pp.993-998
Simmons, Gustavus J. "Symmetric and asymmetric encryption." ACM Computing Surveys (CSUR) 11, no. 4 (1979): 305-330.