IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Security of Wireless Sensor Networks: The Current Trends and Issues

Security of Wireless Sensor Networks: The Current Trends and Issues
View Sample PDF
Author(s): Mumtaz Qabulio (Institute of Information and Communication Technology, University of Sindh, Jamshoro, Pakistan), Yasir Arfat Malkani (Institute of Mathematics and Computer Science, University of Sindh, Jamshoro, Pakistan), Muhammad S. Memon (Department of Information Technology, University of Sindh, Dadu Campus, Pakistan)and Ayaz Keerio (Institute of Mathematics and Computer Science, University of Sindh, Jamshoro, Pakistan)
Copyright: 2021
Pages: 26
Source title: Research Anthology on Architectures, Frameworks, and Integration Strategies for Distributed and Cloud Computing
Source Author(s)/Editor(s): Information Resources Management Association (USA)
DOI: 10.4018/978-1-7998-5339-8.ch108

Purchase

View Security of Wireless Sensor Networks: The Current Trends and Issues on the publisher's website for pricing and purchasing information.

Abstract

Wireless sensor networks (WSNs) are comprised of large collections of small devices having low operating power, low memory space, and limited processing capabilities referred to as sensor nodes. The nodes in WSNs are capable of sensing, recording, and monitoring environmental conditions. Nowadays, a variety of WSNs applications can be found in many areas such as in healthcare, agriculture, industries, military, homes, offices, hospitals, smart transportation, and smart buildings. Though WSNs offer many useful applications, they suffer from many deployment issues. The security issue is one of them. The security of WSNs is considerable because of the use of unguided medium and their deployment in harsh, physically unprotected, and unattended environments. This chapter aims to discuss various security objectives and security attacks on WSNs and summarizes the discussed attacks according to their categories. The chapter also discusses different security protocols presented to prevent, detect, and recover the WSNs from various security attacks.

Related Content

Sushruta Mishra, Sunil Kumar Mohapatra, Brojo Kishore Mishra, Soumya Sahoo. © 2021. 24 pages.
Carlos Santos, Helena InĂ¡cio, Rui Pedro Marques. © 2021. 16 pages.
Akash Chowdhury, Swastik Mukherjee, Sourav Banerjee. © 2021. 26 pages.
Stojan Kitanov, Toni Janevski. © 2021. 28 pages.
Ramesh C. Poonia, Linesh Raja. © 2021. 27 pages.
Jens Kohler, Thomas Specht. © 2021. 27 pages.
Jagdish Chandra Patni. © 2021. 15 pages.
Body Bottom