A Study on Security issues in Wireless Sensor Networks

Authors

  • S Ranjitha Department of CSE, SNS College of Technology, Coimbatore, India
  • D Prabakar Department of CSE, SNS College of Technology, Coimbatore, India
  • S Karthik Department of CSE, SNS College of Technology, Coimbatore, India

Keywords:

Cryptography, Id Based Cryptography, Public Key Cryptography, Security, Wireless Sensor Network

Abstract

Wireless Sensor Network (WSN) is a technology that shows great promise for various futuristic applications both for public and private sectors. Its shows by few applications like disaster management system, battlefield environment and etc. In this connection many issues are considered among that Security is the main issue in the WSN. Unauthorized access in an entire networks leads to dilute the security. For providing security to this network between the nodes, we need some specialized algorithms. Previously many more algorithms are used to provide either data security or network security. Cryptographic strategies and Secure Algorithms are the key factor to ensuring that either data transmission or data handling between nodes are occurred securely. Id (Identity) Based Cryptography and Public Key Cryptography are the types of cryptography which are used to provide security to the data based on sharing keys between sender and receiver in the network.

References

Ashmita Debnath, Pradheepkumar Singaravelu and Shekhar Verma, “Privacy in wireless sensor networks using ring Signature”, Journal of King Saud University – Computer and Information Sciences, Page No (228-236), 2014.

Gowrishankar.S, T.G.Basavaraju, Manjaiah D.H, Subir Kumar Sarkar, “Issues in Wireless Sensor Networks”, Proceedings of the World Congress on Engineering, London, U.K, 2008.

Triana Mugia Rahayu, Sang-Gon Lee and Hoon-Jae Lee, “A Secure Routing Protocol for Wireless Sensor Networks Considering Secure Data Aggregation”, Sensors, 2015.

Madhumita Panda, “Security in Wireless Sensor Networks using Cryptographic Techniques”, American Journal of Engineering Research (AJER), Volume 03, Issue 01, Page No (50-56), 2014.

John Paul Walters, Zhengqiang Liang, Weisong Shi, and Vipin Chaudhary, “Wireless Sensor Network Security: A Survey”, Security in Distributed, Grid and Pervasive Computing, Department of Computer Science, Wayne State University, 2006.

Cam H, Ozdemir S, Muthuavinashiappan D, Nair P, “Energy efficient security protocol for wireless sensor networks”, In IEEE VTC Fall Conference, October 2003.

Rudranath Mitra, Tauseef Khan, “Secure and Reliable Data Transmission in Wireless Sensor Network: A Survey”, International Journal Of Computational Engineering Research( IJCER), Volume 02, Issue 03, Page No (748-754), June 2012.

Asha Rani Mishra, Mahesh Singh, “Elliptic Curve Cryptography (ECC) for Security in wireless Sensor Network”, International Journal of Engineering Research & Technology (IJERT), Volume 01, Issue 03, May 2012.

Sandhyarani.B.H, Nagnath Biradar, T.S.Vishwanath, “An Authenticative Way to Data Transmission for Cluster Based Wireless Sensor Network”, International Journal of Research in Engineering and Technology (IJRET), Volume 04, Special Issue 05, Page No (26-29), May 2015.

M.C.Swathi, A.Dhasaradhi and P.Nirupama, “Providing Efficient and Secure Data Transmission in CWSNs”, International Journal of Advance Research in Computer Science and Management Studies (IJARCSMS), Volume 02, Issue 11, Page N0 (75-83), November 2014.

Downloads

Published

2025-11-10

How to Cite

[1]
S. Ranjitha, D. Prabakar, and S. Karthik, “A Study on Security issues in Wireless Sensor Networks”, Int. J. Comp. Sci. Eng., vol. 3, no. 9, pp. 50–53, Nov. 2025.