Internet of things (Iot) enabled wireless sensor networks security challenges and current solutions

1Citations
Citations of this article
11Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Nowadays Internet of Things (IoT) is emerging and effective technology along with Wireless Sensor Networks (WSNs) in a few constant applications in which the human intervention significantly reduced along with better human life. In IoT enabled WSNs, the sensor nodes used to assemble the fragile data and communicate towards the sink hub and actuators for automotive remote monitoring process. However as the WSNs operating at free frequency band, it is powerless against different attacks at various layers of WSNs protocol stack in which attackers may try to hack and compromise the user’s personal information. There are different types of attacks in WSNs and several research works conducted to protect from these attacks in WSNs. Majority of security methods proposed are based layered technique. However, the layer approach is not enough to protect the WSNs effectively as the many attackers used the cross-layer information to perform the attacks. This paper presents the study over the layered security solutions and their research problems at first to justify the importance of cross-layer solutions. The review of different ways of designing the cross-layer security techniques for WSNs with their behaviour presented as well. The challenges of IoT enabled WSNs single layered security solutions presented and then the various cross-layer solutions reviewed in this paper. The comparative study of different cross-layer techniques to demonstrate the layers and their parameters involved to detect of security threats. The outcome of this review work is the research challenges noticed from the present cross-layer solutions.

Cite

CITATION STYLE

APA

Kore, A., & Patil, S. (2019). Internet of things (Iot) enabled wireless sensor networks security challenges and current solutions. International Journal of Innovative Technology and Exploring Engineering, 9(1), 282–290. https://doi.org/10.35940/ijitee.A4023.119119

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free