Article Details

Review on Security Measures for Wireless Sensor Network Assisted Applications | Original Article

P. Geetha*, Sanjay Kumar, Jambi Ratna Raja Kumar, in Journal of Advances in Science and Technology | Science & Technology

ABSTRACT:

Wireless sensor networks (WSN) were utilized in gathering iformation from human body, war fields, smart power grids, and interstate highways. Sensors have hardware, storage, and computational restrictions. Developing effective ways to secure data in sensor networks is difficult. In most secure interactions, clients validation with significant formation were required safety tasks. Authentication of user permit intercommunication companies in verifying its intercommunication client’s identities. This shared secret session key protects all exchange information once users have been correctly authenticated. Weaknesses in WSNs include security and privacy, limited computation and energy, and dependability difficulties. Wireless sensor networks are commonly utilised to monitor and transmit data. Concerns about security and privacy have been raised about wireless sensor networks. Attackers may easily obtain access to wireless sensor networks by ifusing mischivous information into them. Wireless sensor network were thought being attack-prone. In covering practical situations and applications, as well as the security challenges related to wireless sensor network. Issue of Wide range with concerns in contemporary uses necessitates much study in this field.