Security Attacks and Challenges of Wireless Sensor Network’s -a Review

  • Authors

    • Riaz Shaik
    • Shaik Shakeel Ahamad
    2018-05-31
    https://doi.org/10.14419/ijet.v7i2.32.15387
  • Wireless Sensor Network(WSN), Security, Threat and Attack.
  • Wireless sensor networks are becoming part of many of the research areas to address different issues related to technological and societal. So, The developments in wireless communication technology have made the deployment of  wireless sensor nodes connected through wireless medium, known as wireless sensor networks. Wireless sensor networks have numerous applications in many fields like military , environmental monitoring , health , industry etc.. wireless sensor networks have more benefits over Wired networks .Though there are several advantages of wireless networks, they are prone to security issues. . Security became a major concern for wireless sensor networks because of the wider application. So ,this paper addresses the critical security issues of wireless sensor networks that may encounter in the different layers of the communication protocols like OSI.This paper presents a detailed review on the security issues and its challenges of the wireless sensor networks.

     

     

  • References

    1. [1] Riaz Shaik; Shaik Shakeel Ahamad, Key Management Schemes of Wireless Sensor Networks -A Survey. Fronteiras: Journal of Social, Technological and Environmental Science •v.6, n.2, may-august. 2017.

      [2] Riaz Shaik, Shaik Shakeel Ahamad, Enhanced Attack Resistant Agent Based Dynamic Key Management in Dynamic Wireless Sensor Networks. International Journal of Civil Engineering and Technology, 8(12), 2017, pp. 69–76.

      [3] Riaz Shaik, Shaik Shakeel Ahamad, Attack Resistant Agent Based Dynamic Key Management in Dynamic Wireless Sensor Networks. International Journal of Engineering and Technology,Accepted..

      [4] Riaz Shaik,Shaik Shakeel ahamad (2017). An Agent-Based Hybrid Approach for Dynamic Key Management System in Dynamic Wireless Sensor Network.(JARDCS) journal of advanced research in dynamical and control systems-vol-9,issue-2-OCT-2017.

      [5] Alla Chandra Sekhar Reddy, Riaz Shaik ,Effective Detection of Denial of Service (Dos) Attacks by Using Snort Rules Architecture , International Journal of Applied Engineering Research ISSN 0973-4562 Volume 9, Number 19 (2014) pp. 1635-1646.

      [6] Riaz Shaik, Lokesh Kanagala, Hema Gopinath Sukavasi , Sufficient Authentication for Energy Consumption in Wireless Sensor Networks, . International Journal of Electrical and Computer Engineering (IJECE) Vol. 6, No. 2, April 2016, pp. 735~742.

      [7] Kuan Zhang,Student Member, IEEE, Xiaohui Liang,Member, IEEE,Rongxing Lu,Member, IEEE, and Xuemin Shen,Fellow IEEE,†Sybil Attacks and Their Defenses in the Internet of Thingsâ€, IEEE INTERNET OF THINGS JOURNAL, VOL. 1, NO. 5, OCTOBER 2014

      [8] Yan Sun, Lihua Yin, Wenmao Liu,†Defending sybil attacks in mobile social networksâ€, Computer Communications Workshops (INFOCOM WKSHPS), 2014 IEEE Conference on, 08 July 2014

      [9] Deepti Sharma and Dr. Sanjay Thakur, “SybilDecline: A Survey on Novel Trusted Identity and Threshold Based Path Rank for Sybil Attack Identification in Social Networkâ€,International Journal of advanced research in Computer Science and engineering, Vol. 4, Issue 6, No.June 2014.

      [10] Wei Chang, Jie Wu, Chiu C. Tan, and Feng Li,†Sybil Defenses in Mobile Social Networksâ€, IEEE GLOBECOM, December, 2013

  • Downloads

  • How to Cite

    Shaik, R., & Shakeel Ahamad, S. (2018). Security Attacks and Challenges of Wireless Sensor Network’s -a Review. International Journal of Engineering & Technology, 7(2.32), 136-138. https://doi.org/10.14419/ijet.v7i2.32.15387