z-logo
open-access-imgOpen Access
Identification of Security Threats and Proposed Security Mechanisms for Wireless Sensor Networks
Author(s) -
Anusha Medavaka
Publication year - 2019
Publication title -
international journal of scientific research in computer science, engineering and information technology
Language(s) - English
Resource type - Journals
ISSN - 2456-3307
DOI - 10.32628/cseit195370
Subject(s) - wireless sensor network , key distribution in wireless sensor networks , computer science , computer security , identification (biology) , software deployment , testimonial , wireless network , computer network , wireless , telecommunications , business , botany , biology , advertising , operating system
The serious constraints and requiring deployment atmospheres of wireless sensor networks make safety for these systems extra difficult than for traditional networks Nevertheless, a number of residential or commercial properties of sensor networks may help address the challenge of building safe and secure networks. The distinct aspects of sensor networks may enable novel defenses not available in traditional networks.In this paper, we examine the security related concerns and also obstacles in wireless sensor networks. We identify the safety and security threats, testimonial suggested protection devices for wireless sensor networks.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here