{"title":"Analysis of Security Protocols in Wireless Sensor Networks","authors":"Khudoykulov Zarif Turakulovich, Shirinov Laziz Tokhirovich","doi":"10.1109/ICISCT47635.2019.9012015","DOIUrl":null,"url":null,"abstract":"Nowadays, Wireless Sensor Networks are being used in area monitoring, health care monitoring, environmental/earth sensing, industrial monitoring and therefore security of these networks is becoming a central concern. Wireless Sensor Networks consists of low power, low-cost smart devices that have limited computing resources against current devices, like personal computer. This paper discusses overall constraints, security requirements, security threats, typical attacks and their defensive techniques or countermeasures relevant to the sensor networks. Besides that, best practical suggestions are given to improve current security mechanisms on Wireless Sensor Network.","PeriodicalId":170576,"journal":{"name":"2019 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 International Conference on Information Science and Communications Technologies (ICISCT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICISCT47635.2019.9012015","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Nowadays, Wireless Sensor Networks are being used in area monitoring, health care monitoring, environmental/earth sensing, industrial monitoring and therefore security of these networks is becoming a central concern. Wireless Sensor Networks consists of low power, low-cost smart devices that have limited computing resources against current devices, like personal computer. This paper discusses overall constraints, security requirements, security threats, typical attacks and their defensive techniques or countermeasures relevant to the sensor networks. Besides that, best practical suggestions are given to improve current security mechanisms on Wireless Sensor Network.