Skip to main content

Analysis of Existing Protocols in WSN Based on Key Parameters

  • Conference paper
  • First Online:
Proceedings of 2nd International Conference on Communication, Computing and Networking

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 46))

Abstract

Wireless Sensor Networks (WSNs) is a rising technology that can be easily employed in unusual conditions such as environmental monitoring in soil, marine, earth monitoring, forest fire detection, battlefields, etc. As the nodes are randomly deployed in WSNs, security becomes one of the major issues which WSNs is facing today. The network is easily compromised due to wireless communication. The sensor nodes communication acquires different types of threats related to security. Due to limited storage and low-power of sensor nodes makes the security solutions unachievable. This paper presents the overview of WSNs, its challenges, various attacks, and issues related to security and their defensive mechanisms in WSNs.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci, Wireless sensor networks: a survey. Comput. Netw. 38, 393–422 (2002) (Elsevier)

    Google Scholar 

  2. F. Ye, A. Chen, S. Lu, L. Zhang, A scalable solution to minimum cost forwarding in large sensor networks, in Proceedings of the IEEE International Conference on Computer Communication and Networks (ICCCN), 15–17 Oct 2001 (Phoenix, USA, 2001), pp. 304–309

    Google Scholar 

  3. T. Bonaci, L. Bushnell, R. Poovendran, Node capture attacks in wireless sensor networks: a system theoretic approach, in 49th IEEE Conference on Decision and Control (CDC), vol. 1 (Atlanta, Georgia, USA, 2010), pp. 6765–6772

    Google Scholar 

  4. R. Vaid, V. Kumar, Security issues and remedies in wireless sensor networks—a survey. Int. J. Comput. Appl. 79 (4), 31–39 (2013)

    Google Scholar 

  5. S. Prasanna, S. Rao, An overview of wireless sensor networks applications and security, Int. J. Soft Comput. Eng. (IJSCE) 2 (2). ISSN: 2231-2307 (May 2012)

    Google Scholar 

  6. A. Araujo, J. Blesa, E. Romero, D. Villanueva, Security in cognitive wireless sensor networks—Challenges and open problems. EURASIP J. Wirel. Commun. Netw. 2012, 48 (2012)

    Article  Google Scholar 

  7. Sanjeev Kumar Gupta, Neeraj Jain, Poonam Sinha, Clustering protocols in wireless sensor networks: a survey. Int. J. Appl. Inf. Syst. 5(2), 41–50 (2013)

    Google Scholar 

  8. H. Wendi Rabiner, A. Chandrakasan, H. Balakrishnan, Energy-efficient communication protocol for wireless microsensor networks, in Proceedings of the 33 Annual Hawaii International Conference on System Sciences-2000 (IEEE, 2000), p. 10

    Google Scholar 

  9. R. Vaid, V. Kumar, KURCS: key updating for removing & replacement of compromised sensor nodes from wireless sensor networks. Int. Organ. Sci. Res. J. Comput. Eng. (IOSR-JCE), 17 (3), 57–67 (2015) (Ver. V)

    Google Scholar 

  10. A. Perrig, R. Szewczyk, J.D. Tygar, V. Wen, D.E. Culler, SPINS: security protocols for sensor networks. Wirel. Netw. 8(5), 521–534 (2002)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Charu Sharma .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sharma, C., Vaid, R. (2019). Analysis of Existing Protocols in WSN Based on Key Parameters. In: Krishna, C., Dutta, M., Kumar, R. (eds) Proceedings of 2nd International Conference on Communication, Computing and Networking. Lecture Notes in Networks and Systems, vol 46. Springer, Singapore. https://doi.org/10.1007/978-981-13-1217-5_17

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-1217-5_17

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-1216-8

  • Online ISBN: 978-981-13-1217-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics