Security In Wireless Sensor Networks Based On Lightweight Algorithms : An Effective Survey

نویسندگان

چکیده

At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range applications uses. Sensors are used in industries, including agriculture, transportation, health, many more. Many technologies, such as wireless communication protocols, Internet Things, cloud computing, mobile other emerging connected to usage sensors. In circumstances, this contact necessitates transmission crucial data, necessitating need protect that data from potential threats. However, WSN components often have constrained computation power capabilities, protecting WSNs comes at significant performance penalty. Due massive calculations required by conventional public-key secret encryption methods, information security limited context calls for light techniques. involving sensor networks, is concern. On basis traditional cryptography, number procedures created networks. Some symmetric-key techniques network setups include AES, RC5, SkipJack, XXTEA. These algorithms do, however, several flaws their own, being susceptible chosen-plaintext assault, brute force attack, computational complexity.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Lightweight Intrusion Detection System Based on Specifications to Improve Security in Wireless Sensor Networks

Due to the prevalence of Wireless Sensor Networks (WSNs) in the many mission-critical applications such as military areas, security has been considered as one of the essential parameters in Quality of Service (QoS), and Intrusion Detection System (IDS) is considered as a fundamental requirement for security in these networks. This paper presents a lightweight Intrusion Detection System to prote...

متن کامل

Target Tracking Based on Virtual Grid in Wireless Sensor Networks

One of the most important and typical application of wireless sensor networks (WSNs) is target tracking. Although target tracking, can provide benefits for large-scale WSNs and organize them into clusters but tracking a moving target in cluster-based WSNs suffers a boundary problem. The main goal of this paper was to introduce an efficient and novel mobility management protocol namely Target Tr...

متن کامل

An Adaptive LEACH-based Clustering Algorithm for Wireless Sensor Networks

LEACH is the most popular clastering algorithm in Wireless Sensor Networks (WSNs). However, it has two main drawbacks, including random selection of cluster heads, and direct communication of cluster heads with the sink. This paper aims to introduce a new centralized cluster-based routing protocol named LEACH-AEC (LEACH with Adaptive Energy Consumption), which guarantees to generate balanced cl...

متن کامل

Multiple Target Tracking in Wireless Sensor Networks Based on Sensor Grouping and Hybrid Iterative-Heuristic Optimization

A novel hybrid method for tracking multiple indistinguishable maneuvering targets using a wireless sensor network is introduced in this paper. The problem of tracking the location of targets is formulated as a Maximum Likelihood Estimation. We propose a hybrid optimization method, which consists of an iterative and a heuristic search method, for finding the location of targets simultaneously. T...

متن کامل

A Survey on Security in Wireless Sensor Networks

Advances in electronics and wireless communication technologies have enabled the development of large-scale wireless sensor networks (WSNs). There is numerous applications for wireless sensor networks, and security is vital for many of them. However, WSNs suffer from many constraints, including low computation capability, small memory, limited energy resources, susceptibility to physical captur...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Wasit journal of computer and mathematics science

سال: 2023

ISSN: ['2788-5887', '2788-5879']

DOI: https://doi.org/10.31185/wjcm.106