Emerging security protocols in wireless sensor networks

0Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Wireless Sensor Networks (WSN) is falls under overwhelming and surging technology that shows extraordinary guarantee for different advanced potential applications like military, atomic power plant, human services and so forth, where security is a basic issue. These systems are generally utilized as a part of different conditions that likewise incorporates open condition, unattended nature, a few asset limitations, remote and shared correspondence, un-trusted and broadband transmissions between them, that have different imperatives like low calculation ability, restricted memory, decreased battery existence, absence of foundation that forces safety as an extra difficult undertaking. In this paper a point-by-point examination on the safety related problems in WSN are made. Likewise, a brief on different security systems with proficient power conservation procedures is shown in a table. Comparison of all the security protocols are based on the technique used to give security in wireless sensor networks, the framework used or model used, the key mechanism they are using to provide the best security they can give, which all performance parameters they are improving in terms of energy consumption or increasing network age or reducing some unwanted network performance affecting characteristics and also on what kind of security they are providing and up to which extend they are providing security while transmitting the packets from one end to other end.

Cite

CITATION STYLE

APA

Khambhati, K., & Kumar, K. A. (2019). Emerging security protocols in wireless sensor networks. International Journal of Recent Technology and Engineering, 8(2 Special Issue 4), 42–50. https://doi.org/10.35940/ijrte.B1008.0782S419

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free