0% found this document useful (0 votes)
37 views1 page

Study of Environmentally Sustainable Security in Wireless Sensor Networks

This document summarizes a study on environmentally sustainable security in wireless sensor networks. The study examines security issues in wireless sensor networks (WSNs) which are used in various fields like medical, military, industrial, and agricultural applications. It discusses the challenges of WSNs and security requirements like confidentiality, integrity, authenticity, and data freshness. It also looks at encryption algorithms, security protocols, secure data aggregation, and key management approaches used to provide security in WSNs. The paper aims to focus on research that achieves a high level of security in WSNs given the constraints of sensors like limited energy, memory and processing power.

Uploaded by

Saif Abu Ali
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
37 views1 page

Study of Environmentally Sustainable Security in Wireless Sensor Networks

This document summarizes a study on environmentally sustainable security in wireless sensor networks. The study examines security issues in wireless sensor networks (WSNs) which are used in various fields like medical, military, industrial, and agricultural applications. It discusses the challenges of WSNs and security requirements like confidentiality, integrity, authenticity, and data freshness. It also looks at encryption algorithms, security protocols, secure data aggregation, and key management approaches used to provide security in WSNs. The paper aims to focus on research that achieves a high level of security in WSNs given the constraints of sensors like limited energy, memory and processing power.

Uploaded by

Saif Abu Ali
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Periodicals of Engineering and Natural Sciences ISSN 2303-4521

Vol. 7, No. 4, December 2019, pp.1722-1732

Study of environmentally sustainable security in wireless sensor


networks
Aseel Hamoud Hamza1, Saif M. Kh. Al-Alak1
1
Department of Computer Science, College of Science for Women, University of Babylon, Iraq

ABSTRACT
The popular technology Wireless sensor networks (WSNs) are used in many fields of the application such as the medical,
the military, the industry, the agricultural, etc. In this paper, explains the security issues in the WSNs. Firstly explain the
challenges of wireless sensor networks, the security requirements such as confidentiality, integrity, authenticity, data
freshness, and availability and the attacks in the WSNs, the security issues are accomplished via these classes: [the
encryption algorithms (symmetric, asymmetric, hybrid) , the security protocols such as (Tinysec, SPINS, LEDS, Minisec,
LEAP, MASA, Lightweight LCG, MiniSec, VEBEK of WSN), the secure data aggregation, and the key management,
etc.]. Also, this paper concentrates on the study researches that fulfill the high level of the security in the WSNs.

Keywords: Security, Confidentiality, Integrity, Authentication, Wireless Sensor Networks.


Corresponding Author:
Aseel Hamoud Hamza,
Department of Computer Science,
College of Science for Women,
University of Babylon, Iraq.
Email: aseel.hamod@uobabylon.edu.iq

1. Introduction
Wireless Sensor Networks(WSNs) consists of the number of independent distributed sensors nodes (so-called
motes) to monitor physical or environmental status like as (temperature, pressure, light, sound, and humidity),
the development of Wireless Sensor Networks was first started by military applications such as battleground
observation and yet these are emerged into different fields such as manufacturing process monitoring, good
health monitoring and traffic control etc. [1, 2]. WSN composed of a particular node named gateway node
(Base Station) rich in storage resources and computing. The sensor nodes transmit information to the gateway
among a many nodes using wireless transmission for more processing.

The security requirements for the WSNs are alike to traditional networks, so you must consider the parameters
like as (confidentiality, authenticity, integrity, availability, etc.) in the establishment of the network. Because
of WSNs network limitations (in energy, memory, and processing) not whole security solutions designed for
traditional networks utilized immediately in WSNs. The researchers in the security of the WSNs have
suggested many security systems that have been improved for these networks with resource limitations. A
number of safe and effective routing protocols [3, 4][5][6] and encryption techniques [7, 8][9] and secure data
aggregation [10, 11][12], and the key management [13, 14][15] were suggested by many WSNs security
researchers.
The paper is structured as follows. Section 2 present introduction, the section 3 explains challenges of WSNs.
Section 4 explain security requirements, the section 5 present cryptography on WSNs, the section 6 present
secure data aggregation, section 7 present security protocols in WSNs, the section 8 explain key management,
the section 9 and 10 show in brief way a an attacks on WSNs, and in final we conclude the study in the section
11.

1722

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy