By Topic

Analysis of security protocols for Wireless Sensor Networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Fasee Ullah ; Department of Computer Sciences, City University of Science & Information Technology, Peshawar, Pakistan ; Masood Ahmad ; Masood Habib ; Jawad Muhammad

Sensor network is one of the authoritative leading technology of current century. Security is the main concern for everything whether it is for wired based networks or wireless based networks. So far, many of the researches have thought to physically implement the sensor nodes and sensor networks for secure communications but they did not think over it for security perspective. Sensor network works in very resource constraint environment. Due to these security reasons, we present various protocols to provide the basic needs of data security that are: confidentiality, authentication, freshness and authenticated broadcasting because this broadcasting requires some techniques or protocols to securely communicate with other sensor node(s). Other issues in sensor networks are power management, computation overhead and low memory capacity.

Published in:

Computer Research and Development (ICCRD), 2011 3rd International Conference on  (Volume:2 )

Date of Conference:

11-13 March 2011