Security overview of wireless sensor network

ISSN: 10978135
5Citations
Citations of this article
419Readers
Mendeley users who have this article in their library.

Abstract

There are several types of security threats that can give rise to vulnerability issues and performance degradation for the Wireless Sensor Network (WSN). The existing protocols that incorporate security features for authentication, key management, and secure routing, have not able to protect the WSN, effectively but a new Intrusion Detection System (IDS) can overcome these problems. The IDS collects data for analysis in order to identify any abnormal behaviour at the sensor nodes, which if present, could indicate an attack on the network. Many different intrusion detection systems for wireless sensor networks have been proposed in the past years. This paper focuses on the security requirements, layering-based attacks, and intrusion detection in WSN.

Cite

CITATION STYLE

APA

Modares, H., Moravejosharieh, A., Salleh, R., & Lloret, J. (2013). Security overview of wireless sensor network. Life Science Journal, 10(2), 1627–1632.

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free