A Review of Secure Protocols on Wireless Network Technologies

Authors

  • A. Sasikala PG scholar
  • K. Kumaresan Assistant Professor, Department of Information Technology, K.S.R.College of Engineering

Keywords:

Wireless Sensor Networks, Data Confidentiality, Sinkhole attack, Sybil Attack, WiFi Protected Access

Abstract

Wireless Sensor Networks (WSNs) are used in a various kind of applications in military, ecological, and health-related areas. Security is consequently important in WSNs. However, WSNs suffer from many constraints, collectively with low computation capability, small memory, limited energy resources, capable to physical capture, and the role of anxious wireless communication channels. These constraints make security in WSNs a challenge. In this paper discussed about the security requirements, security attacks and secures routing protocols in WSNs. This paper studies the security ideas of wireless sensor networks. A survey with current threats and steps is carried out, in particular, investigated the protocol layer attack on sensor networks. These issues are classified into five categories: cryptography, key management, protect the routing, protect the data aggregation, and intrusion detection. Along the way we highlight the merits and demerits of different WSN security protocols according to each of these five categories. We also list out the open security issues in each subarea and conclude with possible for progress research directions on security in WSNs.

Downloads

Published

2023-05-20

How to Cite

Sasikala, A., & Kumaresan, K. (2023). A Review of Secure Protocols on Wireless Network Technologies. International Journal of Communication and Computer Technologies, 3(2), 79–88. Retrieved from https://ijccts.org/index.php/pub/article/view/56

Issue

Section

Research Article