Advances in Computer Science and Information Technology. Computer Science and Information Technology. Second International Conference, CCSIT 2012, Bangalore, India, January 2-4, 2012. Proceedings, Part III

Research Article

Wireless Sensor Network Security

Download
292 downloads
  • @INPROCEEDINGS{10.1007/978-3-642-27317-9_33,
        author={Saurabh Sharma and Amit Sahu and Ashok Verma and Neeraj Shukla},
        title={Wireless Sensor Network Security},
        proceedings={Advances in Computer Science and Information Technology. Computer Science and Information Technology. Second International Conference, CCSIT 2012, Bangalore, India, January 2-4, 2012. Proceedings, Part III},
        proceedings_a={CCSIT PART  III},
        year={2012},
        month={11},
        keywords={Wireless Sensor Networks Security Protocols Network Threats},
        doi={10.1007/978-3-642-27317-9_33}
    }
    
  • Saurabh Sharma
    Amit Sahu
    Ashok Verma
    Neeraj Shukla
    Year: 2012
    Wireless Sensor Network Security
    CCSIT PART III
    Springer
    DOI: 10.1007/978-3-642-27317-9_33
Saurabh Sharma1,*, Amit Sahu1,*, Ashok Verma2,*, Neeraj Shukla3,*
  • 1: Rajiv Gandhi Proudyogiki Vishwavidyalaya
  • 2: Gyan Ganga Institute of Technology & Sciences
  • 3: Gyan Ganga College of Technology
*Contact email: saurabh.sharma44@gmail.com, kumaramitsahu@gmail.com, ashokverma@ggits.org, neerajshukla28@gmail.com

Abstract

If sensor networks are to attain their potential, security is one of the most important aspects to be taken care of. The need for security in military applications is obvious, but even more benign uses, such as home health monitoring, habitat monitoring and sub-surface exploration require confidentiality. WSNs are perfect for detecting environmental, biological, or chemical threats over large scale areas, but maliciously induced false alarms could completely negate value of the system. The widespread deployment of sensor networks is directly related to their security strength. These stated facts form the basis for this survey paper. This paper present a brief overview of challenges in designing a security mechanism for WSN, classify different types of attacks and lists available protocols, while laying outline for proposed work.