A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit <a rel="external noopener" href="http://www.airccse.org/journal/ijcses/papers/1111ijcses14.pdf">the original URL</a>. The file type is <code>application/pdf</code>.
<i title="Academy and Industry Research Collaboration Center (AIRCC)">
International Journal of Computer Science & Engineering Survey
Wireless sensor networks emerging has increased now a days , therefore the need for effective security mechanisms is essential. Because sensor networks may interact with sensitive data and operate in hostile unattended environments, it is imperative that these security concerns be addressed from the beginning of the system design. we survey the major topics in wireless sensor network security architecture framework includes the requirements in the sensor security, classify many of the current<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5121/ijcses.2011.2414">doi:10.5121/ijcses.2011.2414</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/2xjlygwegfaadjrzfuiaysyiyu">fatcat:2xjlygwegfaadjrzfuiaysyiyu</a> </span>
more »... tacks, listing out their corresponding defensive measures that can be applied, and finally the classification of secure routing protocols, its design issues and their comparison. Keywords WSNs,MEMS,DOS,LEAP Constraints in WSNs Conventional security algorithms for WSNs can be optimized with the following constraints of sensor nodes. The various constraints for WSN are listed below. Energy plays vital role for a WSN. The study (Hill et al., 2000) plant that in WSNs each bit transmitted ingests as much power per executing 800 to 1000 instructions. Therefore, communication is more dearly-won than computing in WSNs. Thereby any message elaboration induced by security mechanisms comes at a substantial cost. Further, more eminent security levels in WSNs usually equate to more energy ingestion for cryptographic functions. Therefore, WSNs divided into different security levels depending on energy be. (Slijepcevic et al.,2002; Yuan et al., 2002). In general, energy consumption in sensor nodes can be categorized in three parts: (a) energy for the sensor transducer, (b) energy for communication among sensor nodes, and (c) energy for microprocessor computation. Memory limitations A sensor is a insignificant device with small amount of memory and storage space. There is usually not enough space to run complicated algorithms after loading the OS and application code In the Smart Dust project, for example, TinyOS consumes about 4K bytes of instructions, leaving only 4500 bytes for security and applications (Hill et al., 2000). A common sensor may have parameters such as sensor type-TelosB-has a 16-bit, 8 MHz RISC CPU with merely 10K RAM, 48K program memory, and 1024K flash storage. Therefore, the current security algorithms are infeasible in these sensors (Perrig et al., 2002).
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180603081718/http://www.airccse.org/journal/ijcses/papers/1111ijcses14.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/ed/5c/ed5c66b60462845a24152642f8aee528a9cacbb7.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5121/ijcses.2011.2414"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>