A Survey of Security Challenges in Wireless Sensor Networks and Their Secured Protocols

Publish Year: 1392
نوع سند: مقاله کنفرانسی
زبان: English
View: 839

This Paper With 6 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

ISCEE16_239

تاریخ نمایه سازی: 21 تیر 1393

Abstract:

the phenomenal growth of Wireless Sensor Networks (WSNs) over the past few years has attracted significant research and development efforts in academic and industry. They were first used by the military for surveillance purposes and have since expanded into industrial and civilian uses such as weather, traffic control, polluting and healthcare. Due to the sensitive nature of the data gathered by many WSNs it is becoming critical that this data be protected. In this survey, a comprehensive list of major known security threats within wireless sensor networks (WSNs) has been presented. Also, various secure protocols and various solutions to combat attacks have been discussed. The different security protocols were compared and future research directions pertinent to WSNs security have been introduced. We hope this survey provide the insight for future research efforts in the WSN security.

Authors

Morteza Alijani

M.Sc. Student, Department of Communication Engineering Islamic Azad University South Of Tehran Branch Tehran, Iran

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • _ _ _ _ _ 5/08C 2008 IEEE. ...
  • _ _ _ _ _ _ 2009 Conference, pp. 1439-1442, ...
  • _ Madan and S Reddy, "Review of Wireless Sensor Mote ...
  • _ _ _ _ _ vol.47, no.6, pp. 41-46, June ...
  • K.V. Madhav, Rajendra.C and R.L.Selvaraj, _ Study Of Security _ ...
  • R. Sharam, Y.Chaba, and Y. Singh, "Analysis of Security Protocols ...
  • _ _ [11] _ _ _ _ _ IEEE. ...
  • M.A. Khan and G.A Shah and M. Sher, "Challenges for ...
  • D. Boyle and T. Newe, "Security Protocols for use with ...
  • نمایش کامل مراجع