IJTEEE

Open Access Journal of Scientific, Technology & Engineering Research


International Journal of Technology Enhancements and Emerging Engineering Research (ISSN 2347-4289)
QUICK LINKS
CURRENT PUBLICATIONS



IJTEEE >> Volume 3 - Issue 6, June 2015 Edition



International Journal of Technology Enhancements and Emerging Engineering Research  
International Journal of Technology Enhancements and Emerging Engineering Research

Website: http://www.ijteee.org

ISSN 2347-4289



Security Issues and Attacks in Wireless Sensor Networks

[Full Text]

 

AUTHOR(S)

Lovepreet kaur/ CSE Dept GNDU RC Jal, Jyoteesh Malhotra / CSE Dept GNDU RC Jal.

 

KEYWORDS

Keywords : Wireless sensor network, Security, Attacks, Security Mechanisms.

 

ABSTRACT

ABSTRACT: Wireless sensor network is a collection of sensor nodes with limited processor and limited memory unit embedded in it. Sensor networks are used in wide range of applications such as Environment monitoring, health, industrial control units, military applica-tions and many more. This paper defines the security requirements and various attacks on sensor network. This paper also review proposed security mechanisms for WSN.

 

REFERENCES

[1] M.Sharifnejad, M.sharif et.al “A survey on wireless sensor networks security,” 4th international conference,SETIT 2007 Tunisia.

[2] J. Sen “A survey on wireless sensor network security,” International journal of communication networks and in-formation security (IJCNIS) Vol 1, No 2, August 2009.

[3] Manisha, G.Gupta” Attacks on wireless sensor networks: a survey,” International journal od advanced research in computer science and software engineering,Vol 3,Issue 10, Oct 2013.

[4] S. Zhu, S. Setia, and S. Jajodia. Leap: efficient security mechanisms for large-scale distributed sensor networks. In CCS ’03: Proceedings of the 10th ACM conference on Computer and communications security, pages 62–72, New York, NY, USA, 2003. ACM.

[5] B.Kumari, J. Shukla “Secure routing in wireless sensor network,” international journal of advanced research in computer science and software engineering ,Vol 3, Issue 8, Aug 2013.

[6] Z. Tanveer and Z. Albert. “Security issues in wirelesssensor networks,”. In ICSNC ’06: Proceedings of the International Conference on Systems and Networks Communication, page 40, Washington, DC, USA, 2006. IEEE Computer Society.

[7] Lovepreet “Energy-Efficient Routing Protocols in Wireless Sensor Networks: A Survey” International Journal of Computer Applications (0975 – 8887)Volume 100– No.1, August 2014

[8] E. Shi and A. Perrig. Designing secure sensor networks. In Wireless Communications, IEE, volume 11,December 2004.

[9] M. A. R. K.Hamid and H. C. S. Routing security in sensor network: Hello flood attack and defense. In to appear in IEEE ICNEWS, Dhaka, January 2006.

[10] D. R. Raymond and S. F. Midkiff. Denial-of-service in wireless sensor networks: Attacks and defenses. In IEEE Pervasive Computing, volume 7, pages 74–81,2008.