Affiliation:
1. Mahatma Gandhi Institute of Technology, India
2. GRIET, India
3. Koneru Lakshmaiah Education Foundation, India
4. CHRIST University (Deemed), India
Abstract
Wireless sensor networks (WSNs) have as of late been created as a stage for various significant observation and control applications. WSNs are continuously utilized in different applications, for example, therapeutic, military, and mechanical segments. Since the WSN is helpless against assaults, refined security administrations are required for verifying the information correspondence between hubs. Because of the asset limitations, the symmetric key foundation is considered as the ideal worldview for verifying the key trade in WSN. The sensor hubs in the WSN course gathered data to the base station. Despite the fact that the specially appointed system is adaptable with the variable foundation, they are exposed to different security dangers. Grouping is a successful way to deal with vitality productivity in the system. In bunching, information accumulation is utilized to diminish the measure of information that streams in the system.
Reference22 articles.
1. Wireless sensor networks: a survey
2. Araujo, Blesa, Romero, & Villanueva. (2012). Securityincognitivewireless sensor networks - Challenges and open problems. EURASIP Journal on Wireless Communications and Networking, 48.
3. Arvinderpal, Wander, Gura, Eberle, Gupta, & Shantz. (2005). Energy analysis of public-key cryptography for wireless sensor networks. Proceedings of the 3rd IEEE International Conference on Pervasive Computing and Communications, PERCOM-2005, 324-328.
4. Azeem, Khan, & Pramod. (2011). SecurityArchitectureFramework and Secure Routing Protocols in Wireless Sensor Networks-Survey. International Journal of Computer Science & Engineering Survey, 2(4), 189-204.