International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
|
Volume 53 - Issue 1 |
Published: September 2012 |
Authors: Tasneem Halim, Md. Rafiqul Islam |
![]() |
Tasneem Halim, Md. Rafiqul Islam . A Study on the Security Issues in WSN. International Journal of Computer Applications. 53, 1 (September 2012), 26-32. DOI=10.5120/8386-1992
@article{ 10.5120/8386-1992, author = { Tasneem Halim,Md. Rafiqul Islam }, title = { A Study on the Security Issues in WSN }, journal = { International Journal of Computer Applications }, year = { 2012 }, volume = { 53 }, number = { 1 }, pages = { 26-32 }, doi = { 10.5120/8386-1992 }, publisher = { Foundation of Computer Science (FCS), NY, USA } }
%0 Journal Article %D 2012 %A Tasneem Halim %A Md. Rafiqul Islam %T A Study on the Security Issues in WSN%T %J International Journal of Computer Applications %V 53 %N 1 %P 26-32 %R 10.5120/8386-1992 %I Foundation of Computer Science (FCS), NY, USA
Wireless Sensor Network has opened several research criteria related to social security, data management, networking models, distributed system, agricultural aspects, military supervision etc. With the increasing number of applications, an increment in sensor network vulnerabilities has also become noticeably higher. For numerous purposes along with tracing and tracking objects, the sensor nodes with limited power supply, memory usage and computation capability are used to collect data, process it and transmit the generated results to other sensing devices over a specific geographic area. This whole process is done using wireless communication channels which are susceptible to various security threats. Thus securing the WSN has become a great challenge for the researchers. The objective of this paper is to explore these security issues and challenges regarding WSN by classifying security attacks, reviewing proposed security mechanisms and clarifying essential security requirements for specific security schemes. Finally, the relativity between proposed solutions against specific security threats of WSN is shown in a tabular form.