An Overview of Wireless Sensor Networks (WSN): Applications and Security

Authors

  • Kumar A Dept. of Computer Science and Engineering K.N.I.T, Sultanpur, U.P, India
  • Kumar A Dept. of Computer Science and Engineering K.N.I.T, Sultanpur, U.P, India

DOI:

https://doi.org/10.26438/ijcse/v7i7.98100

Keywords:

Wireless, Network, Self-governing, Explicit Data

Abstract

Wireless correspondence innovations keep on experiencing fast headway. Wireless sensor nodes have restricted handling capacity, store-up and active minerals. The presence of sensor network rely on the life of sensor nodes i.e., eventually on the energy inhalation during its procedure. Therefore, in WSN, the effective use of energy resources is very much essential. Clustering is one of the viewpoints for energy saving in WSN. As of late, there has been a lofty development in research in the zone of Wireless sensor systems (WSNs). In WSNs, correspondence happens with the assistance of spatially dispersed, self-governing sensor hubs prepared to detect explicit data. WSNs can be found in an assortment of both military and regular citizen applications around the world. Models incorporate recognizing adversary interruption on the war zone, object following, natural surroundings checking, tolerant observing and fire recognition. Sensor systems are rising as an alluring innovation with extraordinary guarantee for what`s to come. Nonetheless, challenges stay to be tended to in issues identifying with inclusion and arrangement, versatility, nature of-administration, estimate, computational power, vitality proficiency and security. This paper exhibits an outline of the various utilizations of the wireless sensor systems and different security related issues in WSNs.

References

[1] J. Hill, R. Szewczyk, A, Woo, S. Hollar, D. Culler, and K. Pister, “System Architecture Directions for Networked Sensors”, ASPLOS, November 2000.

[2] Culler, D. E and Hong, W., “Wireless Sensor Networks”, Communication of the ACM, Vol. 47, No. 6, pp. 30-33, June 2004.

[3] Undercoffer, J., Avancha, S., Joshi, A., and Pinkston, J., “Security for Sensor Networks”, CADIP Research Symposium, 2002.

[4] A.D. Wood and J.A. Stankovic, (2002) “Denial of Service in Sensor Networks,” Computer, vol. 35, no. 10, pp. 54– 62, 2002.

[5] J. R. Douceur, “The Sybil Attack,” in 1st International Workshop on Peer-to-Peer Systems (IPTPS ‟02), 2002.

[6] Zaw Tun and Aung Htein Maw, “Worm hole Attack Detection in Wireless Sensor networks”, proceedings of world Academy of Science, Engineering and Technology Volume 36, ISSN 2070-3740, December 2008.

Downloads

Published

2019-07-31
CITATION
DOI: 10.26438/ijcse/v7i7.98100
Published: 2019-07-31

How to Cite

[1]
A. Kumar and A. Kumar, “An Overview of Wireless Sensor Networks (WSN): Applications and Security”, Int. J. Comp. Sci. Eng., vol. 7, no. 7, pp. 98–100, Jul. 2019.

Issue

Section

Review Article