Journal Menu
Archive
Last Edition

APPROACH TO SECURITY IN WIRELESS SENSOR NETWORKS

Authors:

Himanshu Monga1

, Silki Baghla2

1Jan Nayak Chaudhary Devi Lal Vidyapeeth, Sirsa (Haryana)
2Jan Nayak Chaudhary Devi Lal Vidyapeeth

Received: 15 June 2016
Accepted: 27 August 2016
Available online: 30 September 2016

Abstract:

The future developments of the wireless sensor networks and its applications demands for the efficient and secure communication. For the solution of efficient and reliable security needs cryptography algorithms provides good solutions. For providing reliable security schemes mainly data confidentiality now-a-days key management is used. This paper provides a review over cryptography schemes being used to deal with security issues of wireless sensor networks.

Keywords:

Wireless Sensor Networks (WSNs), Efficient and Reliable Security, cryptography, communication, data confidentiality

References:

[1] K. Akkaya, M. Younis, A Survey of Routing Protocols in Wireless Sensor Networks, Elsevier Ad Hoc Network Journal, 3 (3), 2005: 325-349. doi:10.1016/j.adhoc.2003.09.010
[2] S.G. Quirino, A.R.L. Riberio E.D. Moreno, Asymmetrical encryption in wireless sensor networks, 2012, 217-232.
[3] E. Shi, A. Perrig, Designing secure sensor networks, Wireless communication magazine, 11 (6), 2004: 37-43.
[4] Y. Wang, G. Attebeery, B. Ramamurthy, A Survey of security issues in wireless sensor networks, IEEE communication surveys and tutorials, 8 (2), 2006: 2-23.
[5] Y. Wang, W. Gee, S. Chellappan, D. Xuan, Ten H. Laii, Search-based physical attacks in sensor networks: Modeling and Defense, technical report, Department of computer science and engineering, Ohio State University, 2005.
[6] S. Ahmad, M.R. Beg, Q. Abbas, Energy saving secure framework for sensor network using elliptical curve cryptography, Mobile Adhoc networks, 2010: 167-172.
[7] R. Ahlswede, I. Csiszar, Common in information theory and cryptography I. secret sharing, IEEE Transactions on Information Theory, 39 (4), 1993: 1121-1132.
[8] D.H. Kerson, A. Meneres, S. Vanstone, Guide to Elliptical curve cryptography, SpringerVerlag New York, Inc. 2004.
[9] A.J. Menezes, P.C. Van Oorschot, S.A. Vanstone, Handbook of applied cryptography, CRC Press, 1996.
[10] G. Gaubtaz, J.P. Kaps, B. Sunar, Public key in sensor networks-revisited, 133, 2004: 2-18.
[11] A. S. Wander, N. Gura, H. Eberle, V. Gupta S. C. Shantz, Energy analysis of public key cryptography for wireless sensor network, 3rd IEEE Conference on Pervasive Computing and Communications, 2005: 324-328.
[12] Y. Zhang, The Scheme of public key infrastructure for improving wireless sensor networks security, Software Engineering and Service Science (ICSESS), 2012 IEEE 3rd International Conference, 22-24 June, 2012, pp.527-530.
[13] W. D., J. Deny, Y. S. Han, S. Chen, P. K. Varshney, A key management scheme for wireless sensor network using deployment knowledge, 2004.
[14] O. Gungor, F. Chen, C.E. Koksal, Secrete key generation via localization and mobility, IEEE Transactions on Vehicular Technology, 6 (6) 2015: 2214-2230.
[15] H. Liu, J. Yang, Y. Wang, Y.J. Chen, C.E. Koksal, Group secret key generation via received signal strength: Protocols, achievable rates, and implementation, IEEE Transactions on Mobile Computing, 13 (12), 2014: 2820-2835.

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License (CC BY-NC 4.0)

Volume 10
Number 3
September 2025

Loading

Last Edition

Volume 10
Number 3
September 2025

How to Cite

H. Monga, S. Baghla, Approach to Security in Wireless Sensor Networks. Applied Engineering Letters, 1(3), 2016: 80-84.

More Citation Formats

Monga, H., & Baghla, S. (2016). Approach to Security in Wireless Sensor Networks. Applied Engineering Letters, 1(3), 80-84.

Monga, Himanshu, & Silki Baghla. “Approach to Security in Wireless Sensor Networks.“ Applied Engineering Letters, vol. 1, no. 3, 2016, pp. 80-84.

Monga, Himanshu, and Silki Baghla. 2016. “Approach to Security in Wireless Sensor Networks.“ Applied Engineering Letters, 1 (3): 80-84.

Monga, H. and Baghla, S. (2016). Approach to Security in Wireless Sensor Networks. Applied Engineering Letters, 1(3), pp. 80-84.

APPROACH TO SECURITY IN WIRELESS SENSOR NETWORKS

Authors:

Himanshu Monga1

, Silki Baghla2

1Jan Nayak Chaudhary Devi Lal Vidyapeeth, Sirsa (Haryana)
2Jan Nayak Chaudhary Devi Lal Vidyapeeth

Received: 15 June 2016.
Accepted: 27 August 2016.
Available online: 30 September 2016.

Abstract:

The future developments of the wireless sensor networks and its applications demands for the efficient and secure communication. For the solution of efficient and reliable security needs cryptography algorithms provides good solutions. For providing reliable security schemes mainly data confidentiality now-a-days key management is used. This paper provides a review over cryptography schemes being used to deal with security issues of wireless sensor networks.

Keywords:

Wireless Sensor Networks (WSNs), Efficient and Reliable Security, cryptography, communication, data confidentiality

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License (CC BY-NC 4.0)

Volume 10
Number 3
September 2025

Loading

Last Edition

Volume 10
Number 3
September 2025