The Network Security in Wireless Sensor Networks: A Review
Downloads
Wireless Sensor Networks (WSN) is an innovative technology predicts to be used ever more in the next to future due to their data achievement and data processing capability. Security for WSN requires to be considered in order to defend the functionality of this network such as the information it communicate and the position of nodes. The safety models & protocols used in traditional networks are not appropriate to WSNs because of its limited resource constraints.
Grover J. & Sharma S. (2016). Security Issues in Wireless Sensor Network – A Review. 5th International Conference on Reliability, Infocom Technologies and Optimization (ICRITO) (Trends and Future Directions), Sep. 7-9, 2016, AIIT, Amity University Uttar Pradesh, Noida, India, 397-404.
Roman R., Zhou J. & Lopez J. (2005). The Security of Wireless Sensor Networks. International Conference on Computational Science and Its Applications – ICCSA 2005, May 9-12, 2005, Springer Verlag, Heidelberg, Germany, 681–690.
Pandey A. & Tripathi R.C. (2010). A survey on Wireless Sensor Networks Security. International Journal of Computer Applications, 3(2), 43-49.
Aseri T. C. & Singla N. (2011). Enhanced Security Protocol in Wireless Sensor Networks. International Journal of Computers, Communications & Control, 6(2), 214-221.
Ahlawat J., Chawla M. & Sharma K. (2012). Attacks and Countermeasures in Wireless Sensor Network. International Journal of Computer Science and Communication Engineering (IJCSCE), 66-69.
Modares H., Salleh R. & Moravejosharieh A. (2011). Overview of Security Issues in Wireless Sensor Networks. Third International Conference on Computational Intelligence, Modelling & Simulation, Langkawi, 308-311
Padmavathi G. & Shanmugapriya D. (2009). A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks. International Journal of Computer Science and Information Security (IJCSIS), 4(2), 1-9.
Zhu S., Setia S. & Jajodia S. (2010). LEAP: Efficient Security Mechanisms for Large Scale Distributed Sensor Networks. 10th ACM Conference on Computer and Communications Security (CCS 03), 62-72.
He D., Chan S., Guizani M., Yang H. & Zhou B. (2014). Secure and Distributed Data Discovery and Dissemination in Wireless Sensor Networks. IEEE Transactions on Parallel and Distributed Systems, 26(4), 1129- 1139.
Ghormare S. & Sahare V. (2015). Implementation of data confidentiality for providing high security in Wireless Sensor Network. International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), Coimbatore, 1-5.
Karlof C., Sastry N., & Wagner D. (2004). Tinysec: A link layer security architecture for wireless sensor networks. SenSys’04 - Proceedings of the Second International Conference on Embedded Networked Sensor Systems, Nov 3-5, 2004, 162–175.
Sharif L. & Ahmed M. (2010). The Wormhole Routing Attack in Wireless Sensor Networks (WSN). Journal of Information Processing Systems, 6(2), 177-184.
Burgner D. E. & Wahsheh L. A. (2011). Security of Wireless Sensor Networks. Eighth International Conference on Information Technology: New Generations (ITNG), Las Vegas, NV, 315-320.
Perrig A., Stankovic J. & Wagner D. (2004). Security in Wireless Sensor Networks. Communications of the ACM, 47(6), 53–57.
Shim K. (2015). A Survey of Public-Key Cryptographic Primitives in Wireless Sensor Networks. IEEE Communications Surveys & Tutorials, 18(1), 577-601.
Bysani L. K. & Turuk A. K. (2011). A Survey on Selective Forwarding Attack in Wireless Sensor Networks. IEEE International Conference on Devices and Communications (ICDCom), 1-5.
Kulkarni G., Shelk R., Gaikwad K., Solanke V., Gujar S. & Khatawkar P. (2013). Wireless sensor network security threats. Fifth International Conference on Advances in Recent Technologies in Communication and Computing (ARTCom 2013), Bangalore, 131-135.
Grover J., Sharma S. & Sharma M. (2014). Location Based Protocols in Wireless Sensor Network – A Review”, IEEE Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT 2014), July 11-13, 2014, Hefei, Anhui, China,
DOI: 10.1109/ICCCNT.2014.6962990, 1-5.
Manju. V. C (2012). A Survey on Wireless Sensor Network Attacks. International Journal of Engineering and Innovative Technology (IJEIT), 2(2), 23-28.
Sharma K. & Ghose M. K. (2010). Wireless Sensor Networks: An Overview on its Security Threats. IJCA Special Issue on Mobile Ad-hoc Networks (MANETs), 1(8), 42-45.
Nachabe L., Girod-Genet M. & El Hassan B. (2015). Unified Data Model for Wireless Sensor Network. IEEE Sensors Journal, 15(7), 3657-3667.
Grover J., Sharma S. & Sharma M. (2014). Reliable SPIN in Wireless Sensor Network. IEEE 3rd International Conference on Reliability, Infocom Technologies and Optimization (ICRITO 2014), October 8-10, 2014, Amity University, Noida, DOI: 10.1109/ICRITO.2014.7014694, 01-06.
Arora B. (2013). A Threat Model Approach for Classification of Network Layer Attacks in WSN. International Journal of Computer Applications, 63(9).
Akyildiz I., Su W., Sankarasubramaniam Y. & Cayirci E. (2002). A survey on sensor networks. IEEE Communication Magazine, 40(8), 102-114.
Jangra B. S. & Kumawat V. (2012). A Survey on Security Mechanisms and Attacks in Wireless Sensor Networks. International Journal of Engineering and Innovative Technology (IJEIT), 2(3), 291-296.