Emerging Security Protocols in Wireless Sensor Networks
Keshvi Khambhati1, Kakelli Anil Kumar2
1Keshvi Khambhati, M.Tech, Scope, VIT, Vellore (Tamil Nadu), India.
2Dr. Kakelli Anil Kumar, Scope, VIT, Vellore (Tamil Nadu), India.
Manuscript received on 02 July 2019 | Revised Manuscript received on 12 August 2019 | Manuscript Published on 27 August 2019 | PP: 42-50 | Volume-8 Issue-2S4 July 2019 | Retrieval Number: B10080782S419/2019©BEIESP | DOI: 10.35940/ijrte.B1008.0782S419
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Wireless Sensor Networks (WSN) is falls under overwhelming and surging technology that shows extraordinary guarantee for different advanced potential applications like military, atomic power plant, human services and so forth, where security is a basic issue. These systems are generally utilized as a part of different conditions that likewise incorporates open condition, unattended nature, a few asset limitations, remote and shared correspondence, un-trusted and broadband transmissions between them, that have different imperatives like low calculation ability, restricted memory, decreased battery existence, absence of foundation that forces safety as an extra difficult undertaking. In this paper a point-by-point examination on the safety related problems in WSN are made. Likewise, a brief on different security systems with proficient power conservation procedures is shown in a table. Comparison of all the security protocols are based on the technique used to give security in wireless sensor networks, the framework used or model used, the key mechanism they are using to provide the best security they can give, which all performance parameters they are improving in terms of energy consumption or increasing network age or reducing some unwanted network performance affecting characteristics and also on what kind of security they are providing and up to which extend they are providing security while transmitting the packets from one end to other end.
Keywords: Security Protocol, Sensors, Wireless Sensor Networks.
Scope of the Article: Wireless ad hoc & Sensor Networks