Identification of Security Threats and Proposed Security Mechanisms for Wireless Sensor Networks

Authors

  • Anusha Medavaka  Software Programmer, Seven Hills IT Solutions LLC, New Jersey

DOI:

https://doi.org//10.32628/CSEIT195370

Keywords:

Security, Wireless Sensor Networks (WSNs), Threats

Abstract

The serious constraints and requiring deployment atmospheres of wireless sensor networks make safety for these systems extra difficult than for traditional networks Nevertheless, a number of residential or commercial properties of sensor networks may help address the challenge of building safe and secure networks. The distinct aspects of sensor networks may enable novel defenses not available in traditional networks.In this paper, we examine the security related concerns and also obstacles in wireless sensor networks. We identify the safety and security threats, testimonial suggested protection devices for wireless sensor networks.

References

  1. Jun Zheng and Abbas Jamalipour, “Wireless Sensor Networks: A Networking Perspective”, a book published by A John & Sons, Inc, and IEEEE, 2009.
  2. Shio Kumar Singh, M.P. Singh, and D.K. Singh, “A survey of Energy-Efficient Hierarchical Cluster-based Routing in Wireless Sensor Networks”, International Journal of Advanced Networking and Application (IJANA), Sept.–Oct. 2010, vol. 02, issue 02, pp. 570–580.
  3. Shio Kumar Singh, M.P. Singh, and D.K. Singh, "Energy-efficient Homogeneous Clustering Algorithm for Wireless Sensor Network", International Journal of Wireless & Mobile Networks (IJWMN), Aug. 2010, vol. 2, no. 3, pp. 49-61.
  4. Shio Kumar Singh, M.P. Singh, and D.K. Singh, “Applications, Classifications, and Selections of Routing Protocols for Wireless Sensor Networks” International Journal of Advanced Engineering Sciences and Technologies (IJAEST), November 2010, vol. 1, issue no. 2, pp. 85-95.
  5. Shio Kumar Singh, M.P. Singh, and D.K. Singh, “Routing Protocols in Wireless Sensor Networks – A Survey” International Journal of Computer Science and Engineering Survey (IJCSES), November 2011, Vol. 1, issue no. 2, pp. 63-83
  6. Shio Kumar Singh, M.P. Singh, and D.K. Singh, "Performance Evaluation and Comparison of Energy-efficient Routing Protocols for Wireless Sensor Network", Global Journal of Computer Application and Technology (GJCAT), Jan. 2011, vol. 1, no. 1, pp. 57-65.
  7. Shio Kumar Singh, M.P. Singh, and D.K. Singh, "Energy Efficient Transmission Error Recovery for Wireless Sensor Network", International Journal of Grid and Distributed Computing (IJGDC), December 2010, vol. 3, no. 4, pp. 89-104.
  8. Sugandhi Maheshwaram, “A Comprehensive Review on the Implementation of Big Data Solutions” in “International Journal of Information Technology and Management”, Vol. XI, Issue No. XVII, November-2016 ISSN : 2249-4510]
  9. Sugandhi Maheshwaram , “An Overview of Open Research Issues in Big Data Analytics” in “Journal of Advances in Science and Technology”, Vol. 14, Issue No. 2, September-2017 ISSN : 2230-9659]
  10. Suresh Kumar Mandala, Neelima Gurrapu, Mahipal Reddy Pulyala, “ A Study on the Development of Machine Learing in Health Analysis”, Indian Journal of Public Health Research & Development, volume 9, Number 12, December 2018, ISSN-0976-0245(Print)-ISSN-0976-5506 (Electronic)]
  11. Suresh Kumar Mandala,Mahipal Reddy Pulyala and Sanjay Pachouri, “Being a Smart Sapien with Information Centric Networking and Cloud Computing”, International Journal of Pure and Applied Mathematics,Volume 117, No. 21, 2017, 243-255,ISSN: 1311-8080 (printed version)]
  12. Suresh Kumar Mandala, Sanjay Pachouri, “performance evaluation of multi stage attacks prediction”, Journal of Advanced Research in Dynamical and Control Systems, Vol. 9, September 2017, JARDCS Special Issue On Engineering Technology.
  13. Thota Mounika, Mandala Suresh kumar, “Document Proximity: Keyword Query Suggestion Based On User Location”, International Journal of Research, Volume 04, Issue 14, November 2017, e-ISSN: 2348-6848 ,p-ISSN: 2348-795X.
  14. Syeda Sobia Farees , M. Suresh Kumar, “A Novel Approach for Protecting Location Information in Geosocial Applications “, IJIEMR, Vol 1, Issue 2, November 2016 ISSN:2456-5083]
  15. Suresh Kumar Mandala,Sanjay Pachouri, “A Reviewed Study on Financial Cyber Crime and Frauds”, International Journal of Advances in Arts, Sciences and Engineering(ijoaase.com), Volume 4 Issue 9, Sep 2016, ISSN. 2320-6144 (Online)]
  16. Siripuri Kiran, Ajmera Rajesh, “A Study on Mining Top Utility Itemsets In A Single Phase” in “International Journal for Science and Advance Research in Technology (IJSART)”, Volume-4, Issue-2, February-2018, 637-642, ISSN(ONLINE): 2395-1052]
  17. Yeshwanth Rao Bhandayker, “Security Mechanisms for Providing Security to the Network” in “International Journal of Information Technology and Management”, Vol. 12, Issue No. 1, February-2017, ISSN : 2249-4510]
  18. Sugandhi Maheshwaram, S. Shoban Babu , “An Overview towards the Techniques of Data Mining” in “RESEARCH REVIEW International Journal of Multidisciplinary”, Volume-04, Issue-02, February-2019 ISSN : 2455-3085]
  19. Yeshwanth Rao Bhandayker , “A Study on the Research Challenges and Trends of Cloud Computing” in “RESEARCH REVIEW International Journal of Multidisciplinary ”, Volume-04, Issue-02, February-2019 ISSN : 2455-3085]
  20. Sriramoju Ajay Babu, Dr. S. Shoban Babu, “Improving Quality of Content Based Image Retrieval with Graph Based Ranking” in “International Journal of Research and Applications”, Volume 1, Issue 1, Jan-Mar 2014 ISSN : 2349-0020 ]
  21. Dr. Shoban Babu Sriramoju, Ramesh Gadde, “A Ranking Model Framework for Multiple Vertical Search Domains” in “International Journal of Research and Applications” Vol 1, Issue 1,Jan-Mar 2014 ISSN : 2349-0020 ].
  22. Mounika Reddy, Avula Deepak, Ekkati Kalyani Dharavath, Kranthi Gande, Shoban Sriramoju, “Risk-Aware Response Answer for Mitigating Painter Routing Attacks” in “International Journal of Information Technology and Management”, Volume VI, Issue I, Feb 2014 ISSN : 2249-4510 ]
  23. Sugandhi Maheshwaram, “A Review on Deep Convolutional Neural Network and its Applications” in “International Journal of Advanced Research in Computer and Communication Engineering”, Vol. 8, Issue No. 2, February-2019 ISSN : 2278-1021], DOI 10.17148/IJARCCE.2019.8230
  24. Yeshwanth Rao Bhandayker. "An Overview : Security Solutions for Cloud Environment." International Journal for Scientific Research and Development 7.2 (2019): 1596-1598.
  25. Yeshwanth Rao Bhandayker. "AN OVERIEW OF CYBER SECURITY", International Journal of Research, vol. 8, Issue. 3 (2019): 2236-6124.
  26. Sugandhi Maheshwaram, "A STUDY ON THE CHALLENGES IN HANDLING BIG DATA", International Journal of Research, vol. 8, Issue. 3 (2019): 2236-6124.
  27. Yeshwanth Rao Bhandayker. "An Overview of Service Models and Cloud Computing Evolution in IT", International Journal of Research and Applications, vol. 5, Issue. 20, Oct - Dec 2018 Transactions 5(20) : 1000-1004. ISSN : 2349 – 0020 ]
  28. Yeshwanth Rao Bhandayker. "A Comprehensive Survey on Security Issues and Advantages towards Cloud Computing", International Journal of Research and Applications, vol. 5, Issue. 18,Apr - Jun 2018 Transactions 5(18): 801-807. ISSN : 2349 – 0020 ]
  29. Sugandhi Maheshwaram, . "A Study on Security Information and Event Management (SIEM)", International Journal of Research and Applications, vol. 5, Issue. 17, Jan - Mar 2018 Transactions 5(17): 705-708. ISSN : 2349 – 0020 ]
  30. Sugandhi Maheshwaram, . "A Novel Technique for Preventing the SQL Injection Vulnerabilities", International Journal of Research and Applications, vol. 5, Issue. 19, July - Sep 2018 Transactions 5(19): 901-909. ISSN : 2349 – 0020 ]
  31. Shoban Babu Sriramoju, "Substantial Overall Performance Pattern-matching Algorithm for etwork Stability", International Journal of Research and Applications, vol. 5, Issue. 17, Jan - Mar 2018 Transactions 5(17): 701-704. ISSN : 2349 – 0020 ]
  32. Sugandhi Maheshwaram. "A Study Design of Big Data by Concentrating on the Atmospheric Information Evaluation." International Journal for Scientific Research and Development 7.3 (2019): 233-236.
  33. Suresh Kumar Mandala,Sanjay Pachouri, “Analytical Study for Intrusion Detection System to Detect Cyber Attack”, Airo International Research Journal, Volume VII, March 2016 ]ISSN: 2320-3714
  34. Ranjeeth kumar.M, M.Suresh Kumar, S.S.V.N Sarma, “FUZZY KEYWORD SEARCH IN XML DATA”, International Journal of Scientific & Engineering Research, Volume 4, Issue 6, June 2013 ISSN : 2229-5518]
  35. Yeshwanth Rao Bhandayker, “AN OVERVIEW OF THEINTEGRATION OF ALL DATA MINING AT CLOUD-COMPUTING” in “Airo International Research Journal”, Volume XVI, June 2018 ISSN : 2320-3714]
  36. Siripuri Kiran, 'Decision Tree Analysis Tool with the Design Approach of Probability Density Function towards Uncertain Data Classification', International Journal of Scientific Research in Science and Technology(IJSRST), Print ISSN : 2395-6011, Online ISSN : 2395-602X,Volume 4 Issue 2, pp.829-831, January-February 2018. URL : http://ijsrst.com/IJSRST1841198
  37. Yeshwanth Rao Bhandayker , “Artificial Intelligence and Big Data for Computer Cyber Security Systems” in “Journal of Advances in Science and Technology”, Vol. 12, Issue No. 24, November-2016 ISSN : 2230-9659]

Downloads

Published

2019-06-30

Issue

Section

Research Articles

How to Cite

[1]
Anusha Medavaka, " Identification of Security Threats and Proposed Security Mechanisms for Wireless Sensor Networks, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 5, Issue 3, pp.194-205, May-June-2019. Available at doi : https://doi.org/10.32628/CSEIT195370