Security in wireless sensor networks: Issues and challanges

S. Ahmad Salehi, M. A. Razzaque, Parisa Naraei, Ali Farrokhtala

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    17 Citations (Scopus)

    Abstract

    Wireless Sensor Networks (WSNs) are employed in numerous applications in different areas including military, ecology, and health; for example, to control of important information like the personnel position in a building, as a result, WSNs need security. However, several restrictions such as low capability of computation, small memory, limited resources of energy, and the unreliable channels employ communication in using WSNs can cause difficulty in use of security and protection in WSNs. It is very essential to save WSNs from malevolent attacks in unfriendly situations. Such networks require security plan due to various limitations of resources and the prominent characteristics of a wireless sensor network which is a considerable challenge. This article is an extensive review about problems of WSNs security, which examined recently by researchers and a better understanding of future directions for WSN security.

    Original languageEnglish
    Title of host publicationInternational Conference on Space Science and Communication, IconSpace
    Pages356-360
    Number of pages5
    DOIs
    Publication statusPublished - 9 Dec 2013
    Event3rd IEEE International Conference on Space Science and Communication - Melaka, Malaysia
    Duration: 1 Jul 20133 Jul 2013
    Conference number: 3

    Publication series

    NameInternational Conference on Space Science and Communication, IconSpace
    ISSN (Print)2165-4301
    ISSN (Electronic)2165-431X

    Conference

    Conference3rd IEEE International Conference on Space Science and Communication
    Abbreviated titleIconSpace 2013
    Country/TerritoryMalaysia
    CityMelaka
    Period1/07/133/07/13

    Fingerprint

    Dive into the research topics of 'Security in wireless sensor networks: Issues and challanges'. Together they form a unique fingerprint.

    Cite this