Wireless sensor networks are made up of number of tiny mobile nodes, which
have the capability of computation, sensing and wireless network communication. The
energy efficiency of
each node in such kind of networks is one of the important issues under
consideration. Thus for these networks, sensor nodes life time is basically depends on use of
routing protocols for routing operations in WSN. There are various routing protocols
propo
sed by different researchers, which are considered as efficient on the basis of
performance of network lifetime and energy scavenging. There are different routing
protocols introduced for WSN such as flat routing protocols, clustering routing protocols,
hi
erarchical routing protocols etc. On the other hand, there are basically two types of
WSNs, homogeneous and heterogeneous sensor networks. As WSN is vulnerable to different
types of security threats, there are many security methods presented with their own
advantages and disadvantages. Most of security methods are applied only on homogeneous
WSN, but recently some methods were presented to provide the routing security in
heterogeneous WSNs as well. In this paper, the different security threats and Intrusion
s in
WSNs are presented, with review of different security methods
.
%0 Generic
%1 uplap2014review
%A Uplap, Prachi
%A and Preeti Sharma,
%B Int. Conf. on Recent Trends in Information, Telecommunication and Computing , ITC
%D 2014
%I ACEEE (A Computer division of IDES)
%K Heterogeneous Homogeneous IDS Intrusions Security WSN
%T Review
of
Heterogeneous/Homogeneous Wireless Sensor Networks and Intrusion Detection System Techniques
%U http://searchdl.org/public/conference/2014/ITC/574.pdf
%X Wireless sensor networks are made up of number of tiny mobile nodes, which
have the capability of computation, sensing and wireless network communication. The
energy efficiency of
each node in such kind of networks is one of the important issues under
consideration. Thus for these networks, sensor nodes life time is basically depends on use of
routing protocols for routing operations in WSN. There are various routing protocols
propo
sed by different researchers, which are considered as efficient on the basis of
performance of network lifetime and energy scavenging. There are different routing
protocols introduced for WSN such as flat routing protocols, clustering routing protocols,
hi
erarchical routing protocols etc. On the other hand, there are basically two types of
WSNs, homogeneous and heterogeneous sensor networks. As WSN is vulnerable to different
types of security threats, there are many security methods presented with their own
advantages and disadvantages. Most of security methods are applied only on homogeneous
WSN, but recently some methods were presented to provide the routing security in
heterogeneous WSNs as well. In this paper, the different security threats and Intrusion
s in
WSNs are presented, with review of different security methods
.
@conference{uplap2014review,
abstract = {Wireless sensor networks are made up of number of tiny mobile nodes, which
have the capability of computation, sensing and wireless network communication. The
energy efficiency of
each node in such kind of networks is one of the important issues under
consideration. Thus for these networks, sensor nodes life time is basically depends on use of
routing protocols for routing operations in WSN. There are various routing protocols
propo
sed by different researchers, which are considered as efficient on the basis of
performance of network lifetime and energy scavenging. There are different routing
protocols introduced for WSN such as flat routing protocols, clustering routing protocols,
hi
erarchical routing protocols etc. On the other hand, there are basically two types of
WSNs, homogeneous and heterogeneous sensor networks. As WSN is vulnerable to different
types of security threats, there are many security methods presented with their own
advantages and disadvantages. Most of security methods are applied only on homogeneous
WSN, but recently some methods were presented to provide the routing security in
heterogeneous WSNs as well. In this paper, the different security threats and Intrusion
s in
WSNs are presented, with review of different security methods
.},
added-at = {2014-03-21T12:35:20.000+0100},
author = {Uplap, Prachi and and Preeti Sharma},
biburl = {https://www.bibsonomy.org/bibtex/2d71f83486d825bb88f11a0c480661dac/idescitation},
booktitle = {Int. Conf. on Recent Trends in Information, Telecommunication and Computing , ITC},
interhash = {d07dd3c5d26846189031fafc595c9b40},
intrahash = {d71f83486d825bb88f11a0c480661dac},
keywords = {Heterogeneous Homogeneous IDS Intrusions Security WSN},
organization = {Institute of Doctors Engineers and Scientists},
publisher = {ACEEE (A Computer division of IDES)},
timestamp = {2014-03-21T12:35:20.000+0100},
title = {Review
of
Heterogeneous/Homogeneous Wireless Sensor Networks and Intrusion Detection System Techniques},
url = {http://searchdl.org/public/conference/2014/ITC/574.pdf},
year = 2014
}