Open Access   Article Go Back

A Study on Security issues in Wireless Sensor Networks

S.Ranjitha 1 , D. Prabakar2 , S. Karthik3

Section:Survey Paper, Product Type: Journal Paper
Volume-3 , Issue-9 , Page no. 50-53, Sep-2015

Online published on Oct 01, 2015

Copyright © S.Ranjitha , D. Prabakar , S. Karthik . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: S.Ranjitha , D. Prabakar , S. Karthik, “A Study on Security issues in Wireless Sensor Networks,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.9, pp.50-53, 2015.

MLA Style Citation: S.Ranjitha , D. Prabakar , S. Karthik "A Study on Security issues in Wireless Sensor Networks." International Journal of Computer Sciences and Engineering 3.9 (2015): 50-53.

APA Style Citation: S.Ranjitha , D. Prabakar , S. Karthik, (2015). A Study on Security issues in Wireless Sensor Networks. International Journal of Computer Sciences and Engineering, 3(9), 50-53.

BibTex Style Citation:
@article{Prabakar_2015,
author = {S.Ranjitha , D. Prabakar , S. Karthik},
title = {A Study on Security issues in Wireless Sensor Networks},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {9 2015},
volume = {3},
Issue = {9},
month = {9},
year = {2015},
issn = {2347-2693},
pages = {50-53},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=639},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=639
TI - A Study on Security issues in Wireless Sensor Networks
T2 - International Journal of Computer Sciences and Engineering
AU - S.Ranjitha , D. Prabakar , S. Karthik
PY - 2015
DA - 2015/10/01
PB - IJCSE, Indore, INDIA
SP - 50-53
IS - 9
VL - 3
SN - 2347-2693
ER -

VIEWS PDF XML
2745 2473 downloads 2447 downloads
  
  
           

Abstract

Wireless Sensor Network (WSN) is a technology that shows great promise for various futuristic applications both for public and private sectors. Its shows by few applications like disaster management system, battlefield environment and etc. In this connection many issues are considered among that Security is the main issue in the WSN. Unauthorized access in an entire networks leads to dilute the security. For providing security to this network between the nodes, we need some specialized algorithms. Previously many more algorithms are used to provide either data security or network security. Cryptographic strategies and Secure Algorithms are the key factor to ensuring that either data transmission or data handling between nodes are occurred securely. Id (Identity) Based Cryptography and Public Key Cryptography are the types of cryptography which are used to provide security to the data based on sharing keys between sender and receiver in the network.

Key-Words / Index Term

Cryptography, Id Based Cryptography, Public Key Cryptography, Security, Wireless Sensor Network

References

[1] Ashmita Debnath, Pradheepkumar Singaravelu and Shekhar Verma, “Privacy in wireless sensor networks using ring Signature”, Journal of King Saud University – Computer and Information Sciences, Page No (228-236), 2014.
[2] Gowrishankar.S, T.G.Basavaraju, Manjaiah D.H, Subir Kumar Sarkar, “Issues in Wireless Sensor Networks”, Proceedings of the World Congress on Engineering, London, U.K, 2008.
[3] Triana Mugia Rahayu, Sang-Gon Lee and Hoon-Jae Lee, “A Secure Routing Protocol for Wireless Sensor Networks Considering Secure Data Aggregation”, Sensors, 2015.
[4] Madhumita Panda, “Security in Wireless Sensor Networks using Cryptographic Techniques”, American Journal of Engineering Research (AJER), Volume 03, Issue 01, Page No (50-56), 2014.
[5] John Paul Walters, Zhengqiang Liang, Weisong Shi, and Vipin Chaudhary, “Wireless Sensor Network Security: A Survey”, Security in Distributed, Grid and Pervasive Computing, Department of Computer Science, Wayne State University, 2006.
[6] Cam H, Ozdemir S, Muthuavinashiappan D, Nair P, “Energy efficient security protocol for wireless sensor networks”, In IEEE VTC Fall Conference, October 2003.
[7] Rudranath Mitra, Tauseef Khan, “Secure and Reliable Data Transmission in Wireless Sensor Network: A Survey”, International Journal Of Computational Engineering Research( IJCER), Volume 02, Issue 03, Page No (748-754), June 2012.
[8] Asha Rani Mishra, Mahesh Singh, “Elliptic Curve Cryptography (ECC) for Security in wireless Sensor Network”, International Journal of Engineering Research & Technology (IJERT), Volume 01, Issue 03, May 2012.
[9] Sandhyarani.B.H, Nagnath Biradar, T.S.Vishwanath, “An Authenticative Way to Data Transmission for Cluster Based Wireless Sensor Network”, International Journal of Research in Engineering and Technology (IJRET), Volume 04, Special Issue 05, Page No (26-29), May 2015.
[10] M.C.Swathi, A.Dhasaradhi and P.Nirupama, “Providing Efficient and Secure Data Transmission in CWSNs”, International Journal of Advance Research in Computer Science and Management Studies (IJARCSMS), Volume 02, Issue 11, Page N0 (75-83), November 2014.