A Study on Security issues in Wireless Sensor Networks
Keywords:
Cryptography, Id Based Cryptography, Public Key Cryptography, Security, Wireless Sensor NetworkAbstract
Wireless Sensor Network (WSN) is a technology that shows great promise for various futuristic applications both for public and private sectors. Its shows by few applications like disaster management system, battlefield environment and etc. In this connection many issues are considered among that Security is the main issue in the WSN. Unauthorized access in an entire networks leads to dilute the security. For providing security to this network between the nodes, we need some specialized algorithms. Previously many more algorithms are used to provide either data security or network security. Cryptographic strategies and Secure Algorithms are the key factor to ensuring that either data transmission or data handling between nodes are occurred securely. Id (Identity) Based Cryptography and Public Key Cryptography are the types of cryptography which are used to provide security to the data based on sharing keys between sender and receiver in the network.
References
Ashmita Debnath, Pradheepkumar Singaravelu and Shekhar Verma, “Privacy in wireless sensor networks using ring Signature”, Journal of King Saud University – Computer and Information Sciences, Page No (228-236), 2014.
Gowrishankar.S, T.G.Basavaraju, Manjaiah D.H, Subir Kumar Sarkar, “Issues in Wireless Sensor Networks”, Proceedings of the World Congress on Engineering, London, U.K, 2008.
Triana Mugia Rahayu, Sang-Gon Lee and Hoon-Jae Lee, “A Secure Routing Protocol for Wireless Sensor Networks Considering Secure Data Aggregation”, Sensors, 2015.
Madhumita Panda, “Security in Wireless Sensor Networks using Cryptographic Techniques”, American Journal of Engineering Research (AJER), Volume 03, Issue 01, Page No (50-56), 2014.
John Paul Walters, Zhengqiang Liang, Weisong Shi, and Vipin Chaudhary, “Wireless Sensor Network Security: A Survey”, Security in Distributed, Grid and Pervasive Computing, Department of Computer Science, Wayne State University, 2006.
Cam H, Ozdemir S, Muthuavinashiappan D, Nair P, “Energy efficient security protocol for wireless sensor networks”, In IEEE VTC Fall Conference, October 2003.
Rudranath Mitra, Tauseef Khan, “Secure and Reliable Data Transmission in Wireless Sensor Network: A Survey”, International Journal Of Computational Engineering Research( IJCER), Volume 02, Issue 03, Page No (748-754), June 2012.
Asha Rani Mishra, Mahesh Singh, “Elliptic Curve Cryptography (ECC) for Security in wireless Sensor Network”, International Journal of Engineering Research & Technology (IJERT), Volume 01, Issue 03, May 2012.
Sandhyarani.B.H, Nagnath Biradar, T.S.Vishwanath, “An Authenticative Way to Data Transmission for Cluster Based Wireless Sensor Network”, International Journal of Research in Engineering and Technology (IJRET), Volume 04, Special Issue 05, Page No (26-29), May 2015.
M.C.Swathi, A.Dhasaradhi and P.Nirupama, “Providing Efficient and Secure Data Transmission in CWSNs”, International Journal of Advance Research in Computer Science and Management Studies (IJARCSMS), Volume 02, Issue 11, Page N0 (75-83), November 2014.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
