To see the other types of publications on this topic, follow the link: Wireless sensor network security.

Journal articles on the topic 'Wireless sensor network security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Wireless sensor network security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Chen, Bowen. "Wireless Communication Chip Designs: analysis of the Wireless Integrated Network Sensors." Highlights in Science, Engineering and Technology 70 (November 15, 2023): 580–87. http://dx.doi.org/10.54097/hset.v70i.13989.

Full text
Abstract:
With the development of wireless technology, wireless integrated network sensor is a new form of sensor network. It enables highly efficient data acquisition and transmission by connecting the sensor nodes wirelessly. The purpose of this study is to investigate the basic principles and techniques of wireless integrated network sensors, analyze their application fields, and conduct experimental studies to verify their performance. This study first introduces the basic principles of wireless integrated network sensors, including wireless communication, sensor nodes, and network topology. Then, r
APA, Harvard, Vancouver, ISO, and other styles
2

Miptahudin, Apip, Titiek Suryani, and Wirawan Wirawan. "Wireless Sensor Network Based Monitoring System: Implementation, Constraints, and Solution." JOIV : International Journal on Informatics Visualization 6, no. 4 (2022): 778. http://dx.doi.org/10.30630/joiv.6.4.1530.

Full text
Abstract:
Wireless Sensor Network (WSN) is a collection of sensors communicating at close range by forming a wireless-based network (wireless). Since 2015 research related to the use of WSN in various health, agriculture, security industry, and other fields has continued to grow. One interesting research case is the use of WSN for the monitoring process by collecting data using sensors placed and distributed in locations based on a wireless system. Sensors with low power, multifunction, supported by a combination of wireless network, microcontroller, memory, operating system, radio communication, and en
APA, Harvard, Vancouver, ISO, and other styles
3

Liu, An, Mihui Kim, Leonardo B. Oliveira, and Hailun Tan. "Wireless Sensor Network Security." International Journal of Distributed Sensor Networks 9, no. 1 (2013): 362385. http://dx.doi.org/10.1155/2013/362385.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ahmad, Rami, Raniyah Wazirali, and Tarik Abu-Ain. "Machine Learning for Wireless Sensor Networks Security: An Overview of Challenges and Issues." Sensors 22, no. 13 (2022): 4730. http://dx.doi.org/10.3390/s22134730.

Full text
Abstract:
Energy and security are major challenges in a wireless sensor network, and they work oppositely. As security complexity increases, battery drain will increase. Due to the limited power in wireless sensor networks, options to rely on the security of ordinary protocols embodied in encryption and key management are futile due to the nature of communication between sensors and the ever-changing network topology. Therefore, machine learning algorithms are one of the proposed solutions for providing security services in this type of network by including monitoring and decision intelligence. Machine
APA, Harvard, Vancouver, ISO, and other styles
5

P.N, Shahana. "WIRELESS SENSOR NETWORK: KEY SECURITY ISSUE AND CHALLENGES." International Journal of Innovative Research in Advanced Engineering 9, no. 5 (2022): 116–23. http://dx.doi.org/10.26562/ijirae.2022.v0905.03.

Full text
Abstract:
Wireless sensor networks (WSNs) are interconnected sensor nodes that communicate wirelessly to collect data about the surrounding environment. A typical sensor node is made up of different components to perform the task of sensing, processing and transmitting data. WSNs are used for many applications in diverse forms from indoor deployment to outdoor deployment. The basic requirement of every application is to use the secured network. Providing security to the sensor network is a very challenging issue along with saving its energy. Many security threats may affect the functioning of these netw
APA, Harvard, Vancouver, ISO, and other styles
6

P.N, Shahana. "WIRELESS SENSOR NETWORK: KEY SECURITY ISSUE AND CHALLENGES." International Journal of Innovative Research in Advanced Engineering 9, no. 5 (2022): 116–23. http://dx.doi.org/10.26562/ijirae.2022.v0905.003.

Full text
Abstract:
Wireless sensor networks (WSNs) are interconnected sensor nodes that communicate wirelessly to collect data about the surrounding environment. A typical sensor node is made up of different components to perform the task of sensing, processing and transmitting data. WSNs are used for many applications in diverse forms from indoor deployment to outdoor deployment. The basic requirement of every application is to use the secured network. Providing security to the sensor network is a very challenging issue along with saving its energy. Many security threats may affect the functioning of these netw
APA, Harvard, Vancouver, ISO, and other styles
7

Karuppannan, Anand, and Mekala Rathinam. "A Survey on Computational Techniques in WSN Networks." Irish Interdisciplinary Journal of Science & Research 08, no. 02 (2024): 71–77. http://dx.doi.org/10.46759/iijsr.2024.8208.

Full text
Abstract:
A network made up of many tiny, inexpensive sensors that use wireless communications is now technically and economically possible because to considerable advancements in hardware manufacturing technology and the creation of effective software algorithms, this is known as a wireless sensor network. The use of sensor networks in mission-critical environments like conflict zones as well as in more commonplace security and business applications like building and traffic surveillance, habitat monitoring, and smart homes, among others, has considerable promise. Wireless sensor networks, however, pro
APA, Harvard, Vancouver, ISO, and other styles
8

Wang, Wei Guo, and Xiao Lei Li. "Problems and Solutions on Security of Wireless Sensor Network in Facilities on Sports Venues." Applied Mechanics and Materials 339 (July 2013): 195–98. http://dx.doi.org/10.4028/www.scientific.net/amm.339.195.

Full text
Abstract:
Security issue of sensor networks is greatly different from that of conventional networks. In this paper, the characteristics analysis of wireless sensor network (WSN) has been carried out firstly, through analysis, the security architecture of sensor networks is proposed, trying to outline a general illustration on this area, and then security defense on the wireless sensor network security issues has been implemented secondly, finally the pairwise keying algorithm has been described and analyzed ,from above all, the ultimate security solution of wireless sensor network has been proposed.
APA, Harvard, Vancouver, ISO, and other styles
9

Parli, B. Hari, and Narayan Singh Shailendra. "A Wireless Sensor Networks Security Protocol Architecture." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 2 (2019): 400–406. https://doi.org/10.35940/ijeat.B3252.129219.

Full text
Abstract:
A wireless sensor network is made up of extremely small autonomous units capable of sensing, computing and communicating. There are numerous restrictions on wireless sensor networks as the resource available to the wireless sensor network is limited. Thus, a number of clustering protocols in a routing sensor organization of sensor networks have been proposed in the literature which increase the throughput, save energy and decrease the delay in the system. In this paper, we put forward SNP, the one of its type link layer security architecture for wireless sensor networks. In this, the design vu
APA, Harvard, Vancouver, ISO, and other styles
10

Hari, Parli Baijnath, and Shailendra Narayan Singh. "Security Attacks at MAC and Network Layer in Wireless Sensor Networks." Journal of Advanced Research in Dynamical and Control Systems 11, no. 12 (2019): 82–89. http://dx.doi.org/10.5373/jardcs/v11i12/20193215.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Yuan, Bingxia. "A Secure Routing Protocol for Wireless Sensor Energy Network Based on Trust Management." Wireless Communications and Mobile Computing 2022 (May 29, 2022): 1–9. http://dx.doi.org/10.1155/2022/5955543.

Full text
Abstract:
In order to enhance the ability of wireless sensor networks to resist various security threats and reduce the limitations caused by the characteristics of wireless sensor networks and sensor nodes, this paper proposes a secure routing protocol for wireless sensor networks based on trust management. Combined with the relevant parameters of wireless sensor network, the simulation experiment is carried out with MATLAB. Aiming at the trust management part of the wireless sensor network security protocol proposed in this paper, the malicious attack environment such as sensor node attributes is simu
APA, Harvard, Vancouver, ISO, and other styles
12

Panwar Rupali Rohankar, Soni. "Security Protocols against the Network Attacks On Wireless Sensor Network." International Journal of Scientific Engineering and Research 2, no. 5 (2014): 45–49. https://doi.org/10.70729/j2013294.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Abidin, Shafiqul. "Wireless Sensor Network and Security Mechanism by Encryption." International Journal of Research in Advent Technology 7, no. 6 (2019): 9–13. http://dx.doi.org/10.32622/ijrat.76201924.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Xia, Zhengxin, Zhe Wei, and Huan Zhang. "Review on Security Issues and Applications of Trust Mechanism in Wireless Sensor Networks." Computational Intelligence and Neuroscience 2022 (September 27, 2022): 1–9. http://dx.doi.org/10.1155/2022/3449428.

Full text
Abstract:
The scale of wireless sensor networks changes depending on specific application tasks. How to design a relatively simple security mechanism that can extend with the expansion of network scale is an arduous task. As the wireless sensor network mostly adopts the decentralized organization form, once the network nodes are distributed adequately, it is difficult to find out the failure of any node. In addition, the node has weak resistance to physical damage, so any node in the network may potentially become a cause of security vulnerability. In this study, firstly, the security standards that wir
APA, Harvard, Vancouver, ISO, and other styles
15

Shaik, Maahiya, and Sung Won Kim. "Security in Wireless Sensor Networks Using OMNET++: Literature Review." Sensors 25, no. 10 (2025): 2972. https://doi.org/10.3390/s25102972.

Full text
Abstract:
With the essential increase in the use of wireless sensor networks, security is a major concern in every field. Intrusions have become frequent and present a significant challenge in today’s world. It is valuable to explore the feasibility of designing and rigorously assessing intrusion detection systems within network simulation environments. Wireless sensor network security risk prediction is a key aspect of wireless network security technology. Analyzing the current state of wireless networks, security is a crucial step in ongoing research in the field of network security. In this paper, we
APA, Harvard, Vancouver, ISO, and other styles
16

Wang, Shanshan, and Yun Chen. "Optimization of Wireless Sensor Network Architecture with Security System." Journal of Sensors 2021 (November 8, 2021): 1–11. http://dx.doi.org/10.1155/2021/7886639.

Full text
Abstract:
Wireless sensor network (WSN) is a new type of wireless network. It has many advantages, but there are some problems. These problems make it easier for attackers to analyze network security holes and attack and destroy entire networks. This article designs a security wireless sensor network model. It can resist most known network attacks without significantly reducing the energy power of sensor nodes. First, we cluster the network organization to reduce energy consumption. It also protects the network based on the calculation of trust levels and the establishment of trust relationships between
APA, Harvard, Vancouver, ISO, and other styles
17

Tiberti, Walter, Federica Caruso, Luigi Pomante, Marco Pugliese, Marco Santic, and Fortunato Santucci. "Development of an extended topology-based lightweight cryptographic scheme for IEEE 802.15.4 wireless sensor networks." International Journal of Distributed Sensor Networks 16, no. 10 (2020): 155014772095167. http://dx.doi.org/10.1177/1550147720951673.

Full text
Abstract:
Among the classes of wireless personal area networks, a wireless sensor network typically refers to a versatile and densely distributed sensing platform that enables the support of a wide variety of application domains. Among the various technical challenges addressed by more than one decade of research in wireless sensor networks, security across wireless links is by far one of the most critical ones and relates to the need of guaranteeing reliability and trustiness of the collected data. This article deals with the cryptographic aspects involved in securing wireless sensor networks, in terms
APA, Harvard, Vancouver, ISO, and other styles
18

Mohammed Abdul, Azeem, and Syed Umar. "Attacks of Denial-of-Service on Networks Layer of OSI Model and Maintaining of Security." Indonesian Journal of Electrical Engineering and Computer Science 5, no. 1 (2017): 181. http://dx.doi.org/10.11591/ijeecs.v5.i1.pp181-186.

Full text
Abstract:
<p>The emergence of wireless sensor networks as one of the technology trends in the coming years, and some special tests of safety. The event will be thousands of tiny sensors that cheap devices, memory, radio and make, in most cases, no access to the production and energy. Some great challenges of sensor networks are different; we focus on security in the form of wireless sensor networks. To some network wireless sensor network in order to optimize use of the sensor, so that the network can be as long as possible. But the management of the important mission of the sensor network, denial
APA, Harvard, Vancouver, ISO, and other styles
19

Kaur, Simerpreet, Md Ataullah, and Monika Garg. "Security from Denial of Sleep Attack in Wireless Sensor Network." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 4, no. 2 (2005): 419–25. http://dx.doi.org/10.24297/ijct.v4i2b1.3230.

Full text
Abstract:
With the advancement in Wireless Sensor Network (WSN) sensors are gaining importance in the physical world. Besides the low power of sensor nodes used, sensors are widely used in detecting temperature, pollution, pressure and other various applications. Energy-constrained sensor networks periodically place nodes to sleep in order to extend the network Lifetime. Denial of sleep attacks are a great threat to lifetime of sensor networks as it prevents the nodes from going into sleep mode. In this paper we are describing prevention against Denials of sleep attack. We have analyzed each of proposed
APA, Harvard, Vancouver, ISO, and other styles
20

Asiya, E. Asiya, and U. Onuu Michael. "Design of a Security Wireless Sensor Network for Emergency Response Centers (SWiSNERC)." Journal of Network Security and Data Mining 3, no. 3 (2020): 1–14. https://doi.org/10.5281/zenodo.4280334.

Full text
Abstract:
<em>The design and implementation of a security wireless sensor network capable of detecting physical intrusion was achieved following a survey of personal area networks and mesh networking. The security network engaged sensor nodes fortified with motion sensors and accelerometers. The sensor characteristics were analyzed and found useful for the design of security wireless sensor network in Cross River State Emergency Response Centre (ERC), in the Federal Republic of Nigeria, for examining and optimizing the State&rsquo;s environs. Technology trends that influence the advancement of such netw
APA, Harvard, Vancouver, ISO, and other styles
21

Singh, Barinder Paul, Anish Arora, and Ashish Kumar. "Security in Wireless Sensor Networks." JOURNAL OF ADVANCES IN PHYSICS 1, no. 1 (2013): 1–4. http://dx.doi.org/10.24297/jap.v1i1.2137.

Full text
Abstract:
Wireless Sensor Network (WSN) is an emerging technology that shows great promise for various futuristic applications both for mass public and military. The sensing technology combined with processing power and wireless communication makes it lucrative for being exploited in abundance in future. The inclusion of wireless communication technology also incurs various types of security threats. The intent of this paper is to investigate the security related issues and challenges in wireless sensor networks. We identify the security threats, review proposed security mechanisms for wireless sensor n
APA, Harvard, Vancouver, ISO, and other styles
22

Elamurugu, V., and D. J. Evanjaline. "DynAuthRoute: Dynamic Security for Wireless Sensor Networks." Indian Journal Of Science And Technology 17, no. 13 (2024): 1323–30. http://dx.doi.org/10.17485/ijst/v17i13.49.

Full text
Abstract:
Objectives: The research aims to design an architecture for secure transmission of data in wireless sensor networks. Methods: The method involves three main pillars: authentication, data encryption, and dynamic routing. Extensive simulations have been conducted to evaluate the suggested method in terms of energy consumption, memory footprint, packet delivery ratio, end-to-end latency, execution time, encryption time, and decryption time. Findings: For authentication, a dynamic key is used to power an improved salt password hashing method. Data encryption is performed using format-preserving en
APA, Harvard, Vancouver, ISO, and other styles
23

Yang, Bin, Ren Yi Fu, Jian Zhong Diao, and Hui Rong Liu. "Security Mechanisms Analysis for ZigBee Standard Based on AES-CCM*." Advanced Materials Research 468-471 (February 2012): 1359–62. http://dx.doi.org/10.4028/www.scientific.net/amr.468-471.1359.

Full text
Abstract:
The security of wireless sensor networks is very important. ZigBee technology offers an optional security system to ensure the wireless sensor network runs safely and reliably. This article analysis of the ZigBee security mechanisms, key management, encryption algorithm and its data integrity mechanism, ZigBee security based on the CCM* mode of the AES-128, has several security scheme, which is a relatively reliable wireless sensor network standard.
APA, Harvard, Vancouver, ISO, and other styles
24

Minakshi, Sharma*, Kalra Sakshi, and Monga Chanda. "A SURVAY ON SECURITY ISSUES AND ATTACKS IN WIRELESS SENSOR NETWORK." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 5, no. 3 (2016): 563–67. https://doi.org/10.5281/zenodo.48314.

Full text
Abstract:
Wireless sensor network is the most growing technology for sensing and performing the different tasks. With the beginning of the internet, security has&nbsp; become a major concern and the history of security allows a better understanding of the emergence of security technology. The intent of this paper is to consider the protection correlated issues and incitements in wireless sensor networks. We identify the security threats, appraisal anticipated security mechanisms for wireless sensor networks. The inclusion of wireless communication technology also incurs various types of security threats
APA, Harvard, Vancouver, ISO, and other styles
25

K B, Vikhyath, and Dr Brahmanand S. H. "Wireless sensor networks security issues and challenges: A survey." International Journal of Engineering & Technology 7, no. 3.3 (2018): 89. http://dx.doi.org/10.14419/ijet.v7i2.33.13861.

Full text
Abstract:
Wireless Sensor Network (WSN) is a rising technology that offers a great assurance towards a variety of revolutionary applications such as military and public. As wireless sensor networks continue to develop, there is a high importance in security mechanisms. As sensor networks works with responsive data and operate in antagonistic environments, it is crucial to address the security issues. The sensing technology united with wireless communication and processing power makes it rewarding. Due to these computing and inherent constraints in resource, sensor network security has special challenges
APA, Harvard, Vancouver, ISO, and other styles
26

Gao, Feng, and Zhi Hua Hu. "The Security Mechanism for Wireless Sensor Networks." Applied Mechanics and Materials 256-259 (December 2012): 2392–95. http://dx.doi.org/10.4028/www.scientific.net/amm.256-259.2392.

Full text
Abstract:
In recent years, with advances in microelectronics technology and wireless communication technology which promote the rapid development of low power, low price, multifunction sensor, and it also contributed to the development of wireless sensor networks. Wireless sensor network can be used in military, medical and commercial areas. This paper mainly described the characteristics of wireless sensor networks, security threats in the communication process and analyzed its security needs of taking security mechanisms to ensure the security of wireless communications.
APA, Harvard, Vancouver, ISO, and other styles
27

Sumant, Verma. "Security Management in Wireless Sensor Network (WSN)." International Journal of Innovative Science and Research Technology 7, no. 9 (2022): 801–4. https://doi.org/10.5281/zenodo.7141319.

Full text
Abstract:
Wireless Sensor Network (WSN) plays a vital role in emerging sensing technology. They are used in various fields such as military operations, healthcare applications, traffic control, and home applications. Even sensor can monitor, pressure, humidity, noise level, temperature, soil makeup and other properties. Wireless Sensor Network can be of consist of different types of sensors like thermal, visual, infrared, acoustic and radar. Wireless Sensor Network (WSN) is broadcast nature of the wireless communication so it becomes easy for the attacker to send false data or false information to compr
APA, Harvard, Vancouver, ISO, and other styles
28

Sumant, Verma, and Dheeraj Rane Dr. "Security Management in Wireless Sensor Network (WSN)." International Journal of Innovative Science and Research Technology 7, no. 10 (2022): 505–8. https://doi.org/10.5281/zenodo.7269324.

Full text
Abstract:
Wireless Sensor Network (WSN) plays a vital role in emerging sensing technology. They are used in various fields such as military operations, healthcare applications, traffic control, and home applications. Even sensor can monitor, pressure, humidity, noise level, temperature, soil makeup and other properties. Wireless Sensor Network can be of consist of different types of sensors like thermal, visual, infrared, acoustic and radar. Wireless Sensor Network (WSN) is broadcast nature of the wireless communication so it becomes easy for the attacker to send false data or false information to compr
APA, Harvard, Vancouver, ISO, and other styles
29

Sumant, Verma, and Baniya Pradeep. "Security Management in Wireless Sensor Network (WSN)." International Journal of Innovative Science and Research Technology 7, no. 11 (2022): 1293–96. https://doi.org/10.5281/zenodo.7451603.

Full text
Abstract:
Wireless Sensor Network (WSN) plays a vital role in emerging sensing technology. They are used in various fields such as military operations, healthcare applications, traffic control, and home applications. Even sensor can monitor, pressure, humidity, noise level, temperature, soil makeup and other properties. Wireless Sensor Network can be of consist of different types of sensors like thermal, visual, infrared, acoustic and radar. Wireless Sensor Network (WSN) is broadcast nature of the wireless communication so it becomes easy for the attacker to send false data or false information to compr
APA, Harvard, Vancouver, ISO, and other styles
30

ABIDI, Bahae, Abdelillah JILBAB, and Mohamed EL HAZITI. "Security in wireless sensor networks." International Journal of Informatics and Communication Technology (IJ-ICT) 8, no. 1 (2019): 13. http://dx.doi.org/10.11591/ijict.v8i1.pp13-18.

Full text
Abstract:
Even in difficult places to reach, the new networking technique allows the easy deployment of sensor networks, although these wireless sensor networks confront a lot of constraints. The major constraint is related to the quality of information sent by the network. The wireless sensor networks use different methods to achieve data to the base station. Data aggregation is an important one, used by these wireless sensor networks. But this aggregated data can be subject to several types of attacks and provides security is necessary to resist against malicious attacks, secure communication between
APA, Harvard, Vancouver, ISO, and other styles
31

Bahae, Abidi, Jilbab Abdelillah, and El Haziti Mohamed. "Security in wireless sensor networks." International Journal of Informatics and Communication Technology (IJ-ICT) 8, no. 1 (2019): 13–18. https://doi.org/10.11591/ijict.v8i1.pp13-18.

Full text
Abstract:
Even in difficult places to reach, the new networking technique allows the easy deployment of sensor networks although these wireless sensor networks confront a lot of constraints. The major constraint is related to the quality of information sent by the network. The wireless sensor networks use different methods to achieve data to the base station. Data aggregation is an important one, used by these wireless sensor networks. But this aggregated data can be subject to several types of attacks and provides security is necessary to resist against malicious attacks, secure communication between s
APA, Harvard, Vancouver, ISO, and other styles
32

Zeng, Tao. "Routing Protocol Security Strategies of Non-Uniform Energy Distribution Wireless Network." Applied Mechanics and Materials 536-537 (April 2014): 715–18. http://dx.doi.org/10.4028/www.scientific.net/amm.536-537.715.

Full text
Abstract:
Unlike other networks based on wireless sensor networks, such as the characteristics of Ad hoc network design algorithm to reduce the energy consumption of wireless sensor networks. The main study of wireless sensor networks in a variety of energy-saving protocols and algorithms, analyze the impact of these agreements on energy saving in different environments, MAC protocol for wireless sensor network design energy efficient use of its improvement, based on the maximum advantage disjoint approximate area set covering algorithm. Energy efficient or superior energy savings in the paper can prolo
APA, Harvard, Vancouver, ISO, and other styles
33

Kotukh, Y., V. Lubchak, and O. Strakh. "New continuous-discrete model for wireless sensor networks security." Radiotekhnika, no. 210 (September 28, 2022): 99–103. http://dx.doi.org/10.30837/rt.2022.3.210.07.

Full text
Abstract:
A wireless sensor network (WSN) is a group of "smart" sensors with a wireless infrastructure designed to monitor the environment. This technology is the basic concept of the Internet of Things (IoT). The WSN can transmit confidential information while working in an insecure environment. Therefore, appropriate security measures must be considered in the network design. However, computational node constraints, limited storage space, an unstable power supply, and unreliable communication channels, and unattended operations are significant barriers to the application of cybersecurity techniques in
APA, Harvard, Vancouver, ISO, and other styles
34

Khalil Aljwari, Fatimah, Hajer Abdullah Alwadei, and Aseel Abdullah Alfaidi. "Security in Wireless Sensor Networks: Comparative Study." International Journal of Computer Science and Information Technology 14, no. 03 (2022): 55–65. http://dx.doi.org/10.5121/ijcsit.2022.14305.

Full text
Abstract:
The security in wireless sensor networks (WSNS) is a very important issue. These networks may be exposed it different attacks. With this in mind, researchers propose in this area variety of security techniques for this purpose, and this article describes security in wireless sensor networks. Discussed threats and attacks of wireless sensor networks. The article also aims to provide the basic information related to determining essential requirements for the protection WSNs. Lastly, we mention some security mechanisms against these threats and attacks in Wireless Sensor Network.
APA, Harvard, Vancouver, ISO, and other styles
35

Nourildean, Shayma Wail, Mustafa Dhia Hassib, and Yousra Abd Mohammed. "Internet of things based wireless sensor network: a review." Indonesian Journal of Electrical Engineering and Computer Science 27, no. 1 (2022): 246. http://dx.doi.org/10.11591/ijeecs.v27.i1.pp246-261.

Full text
Abstract:
Recently, Internet of Things (IoT) technologies are developing technology with a variety of applications. The Internet of Things (IoTs) is defined as a network of ordinary objects such as Internet TVs, smartphones, actuators and sensors that are smartly connected together to enable new types of communication between people and things as well as between things themselves. Wireless sensor networks (WSNs) play an important part in Internet of Things (IoT) technology. A contribution to wireless sensor networks and IoT applications is wireless sensor nodes’ construction with high-speed CPUs and low
APA, Harvard, Vancouver, ISO, and other styles
36

Lu, Fei, Haojing Huang, Zhenjiang Shi, and Zihan Lin. "Research on Security Strategies for Wireless Sensor Networks in Internet of Things Applications." Education Reform and Development 6, no. 11 (2024): 127–33. http://dx.doi.org/10.26689/erd.v6i11.8891.

Full text
Abstract:
With the development of modern science and technology, the Internet of Things has been widely used in many fields, and it involves a wide range of technologies, among which the most important technology is the sensor, the most basic technology. The sensor network node working environment has been very complex and demanding; if slightly relaxed, it will lead to the sensor facing many security risks. Therefore, strengthening the security of wireless sensor networks has become an essential part of the Internet of Things project. This paper mainly starts with an overview of the Internet of Things
APA, Harvard, Vancouver, ISO, and other styles
37

Vino, T., S. S. Sivaraju, R. V. V. Krishna, et al. "Multicluster Analysis and Design of Hybrid Wireless Sensor Networks Using Solar Energy." International Journal of Photoenergy 2022 (October 11, 2022): 1–8. http://dx.doi.org/10.1155/2022/1164613.

Full text
Abstract:
A wireless touch network is a distributed, self-organizing network of multiple sensors and actuators in combination with multiple sensors and a radio channel. Also, the security area of such a network can be several meters to several meters. The main difference between wireless sensor networks from traditional computer and telephone networks is the lack of a fixed infrastructure owned by a specific operator or provider. Each user terminal in a touch network is capable of acting as a terminal device only. Despite the long history of sensor networks, the concept of building a sensor network is n
APA, Harvard, Vancouver, ISO, and other styles
38

Anil, Dattatraya Nimbalkar, Ali Azmat, and Y. M. Patil. "Security issues in wireless sensor networks." i-manager’s Journal on Wireless Communication Networks 11, no. 2 (2023): 32. http://dx.doi.org/10.26634/jwcn.11.2.19780.

Full text
Abstract:
The main purpose of Wireless Sensor Networks (WSNs) is to collect data from unsafe environments. Almost all WSN security protocols assume that an adversary may gain complete control of a sensor node through direct physical access. As sensor networks emerge as a key technology in the future, researchers have faced a number of challenges. A wireless sensor network is made up of many tiny sensor nodes that operate independently and, in some cases, have no access to renewable energy sources. Additionally, as security is essential to the acceptability and use of sensor networks for a variety of app
APA, Harvard, Vancouver, ISO, and other styles
39

John, Ayuba, Ismail Fauzi Isnin, and Syed Hamid Hussain Madni. "Current Security Threats in Applications of Wireless Sensor Network." International Journal on Engineering, Science and Technology 5, no. 3 (2023): 255–72. http://dx.doi.org/10.46328/ijonest.174.

Full text
Abstract:
Wireless sensor networks have a broader application range in almost every field of human endeavours, which exposes them to a variety of security threats on a daily basis from cyber criminals. It is a remote monitoring system for events or phenomena in areas such as smart grids, intelligent healthcare, circular economies in smart cities, and underwater surveillance. Cybersecurity threats have long been a source of concern in the field of wireless sensor networks. The goal of cyber security in this era is to certify the authenticity of networks confidentiality, data integrity and availability of
APA, Harvard, Vancouver, ISO, and other styles
40

Anwar, Md Navid Bin, and Maherin Mizan Maha. "AMPC: A Lightweight Hybrid Cryptographic Algorithm for Wireless Sensor Networks." International Journal of Innovative Science and Research Technology 5, no. 6 (2020): 1142–46. http://dx.doi.org/10.38124/ijisrt20jun975.

Full text
Abstract:
Wireless sensor network (WSN) is a group of several autonomous sensor nodes attached to each other. Wireless sensor networks are commonly used in a lot of applications and are expected to have a cheap deployment cost. The network of sensors continues to grow aiding the need of the system. Due to that, sensors become vulnerable to attacks and need strong security mechanism. To strengthen the security of data which are transmitted through sensors in WSN, different cryptographic schemes are used. As WSN has limited energy source, therefore, complex cryptographic algorithms may require excessive c
APA, Harvard, Vancouver, ISO, and other styles
41

Kar, Dulal C., Hung L. Ngo, and Geetha Sanapala. "Applied Cryptography for Security and Privacy in Wireless Sensor Networks." International Journal of Information Security and Privacy 3, no. 3 (2009): 14–36. http://dx.doi.org/10.4018/jisp.2009100702.

Full text
Abstract:
It is challenging to secure a wireless sensor network (WSN) because its inexpensive, tiny sensor nodes do not have the necessary processing capability, memory capacity, and battery life to take advantage of the existing security solutions for traditional networks. Existing security solutions for wireless sensor networks are mostly based on symmetric key cryptography with the assumption that sensor nodes are embedded with secret, temporary startup keys before deployment thus avoiding any use of computationally demanding public key algorithms altogether. However, symmetric key cryptography alone
APA, Harvard, Vancouver, ISO, and other styles
42

Malmurugan, N., S. Christalin Nelson, Majid Altuwairiqi, et al. "Hybrid Encryption Method for Health Monitoring Systems Based on Machine Learning." Computational Intelligence and Neuroscience 2022 (July 7, 2022): 1–13. http://dx.doi.org/10.1155/2022/7348488.

Full text
Abstract:
Numerous forms of disasters and vandalism can occur in transmission lines, which makes them vulnerable. As a result, the transmission pipes must be protected by a reliable monitoring system. When a wireless sensor network is built from disparate devices that are positioned at varying distances from one another, it can be used to monitor physical and environmental conditions in the surrounding environment. In addition to the built-in sensor on the exterior of a pipeline and sensors positioned to support bridge structures, wireless sensor networks have a range of other applications. Other uses i
APA, Harvard, Vancouver, ISO, and other styles
43

He, Hui, Dongyan Zhang, Xing Wang, Min Liu, Weizhe Zhang, and Junxi Guo. "Multitask Learning-Based Security Event Forecast Methods for Wireless Sensor Networks." Journal of Sensors 2016 (2016): 1–11. http://dx.doi.org/10.1155/2016/6047023.

Full text
Abstract:
Wireless sensor networks have strong dynamics and uncertainty, including network topological changes, node disappearance or addition, and facing various threats. First, to strengthen the detection adaptability of wireless sensor networks to various security attacks, a region similarity multitask-based security event forecast method for wireless sensor networks is proposed. This method performs topology partitioning on a large-scale sensor network and calculates the similarity degree among regional subnetworks. The trend of unknown network security events can be predicted through multitask lear
APA, Harvard, Vancouver, ISO, and other styles
44

Sujihelen, L., Rajasekhar Boddu, S. Murugaveni, et al. "Node Replication Attack Detection in Distributed Wireless Sensor Networks." Wireless Communications and Mobile Computing 2022 (May 31, 2022): 1–11. http://dx.doi.org/10.1155/2022/7252791.

Full text
Abstract:
Wireless sensor network (WSN) is an emerging technology used in emergency scenarios. There are a number of possible threats to WSNs because they use unsupervised IP addresses. Securing networks with unattended sensors is a real challenge nowadays. Sensor nodes lack power and storage, making them incompatible with normal security checks. It will be vital to make advancements in sensor network architecture and protocol design. There will be more vulnerability to attack if there is a lack of security. Especially, one key attack is node replication which induces the sensor node to acts as an origi
APA, Harvard, Vancouver, ISO, and other styles
45

Zhao, Ke, Long Fei Xiao, Ya Long Hu, and Zhong Wang. "Based on the Research of WSN in Information Security Technology." Applied Mechanics and Materials 556-562 (May 2014): 5976–78. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.5976.

Full text
Abstract:
With the advance of technology, people is more and more nervous to security threats posed by wireless sensor. Therefore, Based on security technology, this paper puts forward a suitable for the safety management unit used in wireless sensor network, And the provisions of its agreement, authentication methods and security processing methods, making wireless sensor networks can transmit user information in a secure environment, while simulation analysis the affect design module on date security transmission, when the wireless sensor networks have security management unit, it will a better, more
APA, Harvard, Vancouver, ISO, and other styles
46

Shokrzadeh, Hamid, M. R. Majma, A. Movassagh, and M. Saheb. "Routing Security in Wireless Sensor Networks." Lecture Notes on Software Engineering 3, no. 4 (2015): 303–7. http://dx.doi.org/10.7763/lnse.2015.v3.209.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Raja, Piyush, Amit Kumar, Ram Krishna Kumar, and Birendra Goswami. "An Overview of Problems and Difficulties with ML in WSNs Protection." European Journal of Applied Science, Engineering and Technology 2, no. 2 (2024): 245–78. https://doi.org/10.59324/ejaset.2024.2(2).18.

Full text
Abstract:
There are serious, mutually exclusive problems with resources and security in wireless sensor networks. As security complexity rises, battery consumption will follow suit. It is useless to rely on the security of common protocols like encryption and key management because of the limited capacity of wireless sensor networks and their dynamic architecture. Algorithms for machine learning are one of the proposed ways to combine judgment, awareness and observation to deliver intelligence services in this kind of network. Machine learning algorithms provide new issues related to training and the am
APA, Harvard, Vancouver, ISO, and other styles
48

Li, Chun Yuan, Xiao Tong Zhang, Yue Qi, Li Wen He, Hong Song Chen, and Xue Ying Zhang. "A New Key Management Scheme for Hierarchical Wireless Sensor Network." Applied Mechanics and Materials 385-386 (August 2013): 1622–25. http://dx.doi.org/10.4028/www.scientific.net/amm.385-386.1622.

Full text
Abstract:
Security is critically important for hierarchical wireless sensor networks. Due to the limited resources of the sensor nodes, the traditional key management schemes are not suitable for wireless sensor network. In this paper, a new key management scheme for hierarchical wireless sensor network is proposed, which would be effectively against cluster node capture by supporting multiple keying mechanisms. The security of network is independent on a single key. Compared with the LEAP protocol, our scheme has lower consumption and higher scalability.
APA, Harvard, Vancouver, ISO, and other styles
49

Rehman, Attique Ur, Muhammad Sajid Mahmood, Shoaib Zafar, et al. "A Survey on MAC-Based Physical Layer Security over Wireless Sensor Network." Electronics 11, no. 16 (2022): 2529. http://dx.doi.org/10.3390/electronics11162529.

Full text
Abstract:
Physical layer security for wireless sensor networks (WSNs) is a laborious and highly critical issue in the world. Wireless sensor networks have great importance in civil and military fields or applications. Security of data/information through wireless medium remains a challenge. The data that we transmit wirelessly has increased the speed of transmission rate. In physical layer security, the data transfer between source and destination is not confidential, and thus the user has privacy issues, which is why improving the security of wireless sensor networks is a prime concern. The loss of phy
APA, Harvard, Vancouver, ISO, and other styles
50

Itani, Wassim, Ayman Kayssi, and Ali Chehab. "Wireless Body Sensor Networks." International Journal of Reliable and Quality E-Healthcare 5, no. 2 (2016): 1–30. http://dx.doi.org/10.4018/ijrqeh.2016040101.

Full text
Abstract:
In this paper, the authors provide a detailed overview and technical discussion and analysis of the latest research trends in securing body sensor networks. The core of this work aims at: (1) identifying the resource limitations and energy challenges of this category of wireless sensor networks, (2) considering the life-critical applications and emergency contexts that are encompassed by body sensor network services, and (3) studying the effect of these peculiarities on the design and implementation of rigorous and efficient security algorithms and protocols. The survey discusses the main adva
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!