{"title":"Security Architecture Framework and Secure Routing Protocols in Wireless Sensor Networks - Survey","authors":"A. Azeem, K. Khan, Pramod","doi":"10.5121/IJCSES.2011.2414","DOIUrl":null,"url":null,"abstract":"Wireless sensor networks emerging has increased now a days , therefore the need for effective security mechanisms is essential. Because sensor networks may interact with sensitive data and operate in hostile unattended environments, it is imperative that these security concerns be addressed from the beginning of the system design. we survey the major topics in wireless sensor network security architecture framework includes the requirements in the sensor security, classify many of the current attacks, listing out their corresponding defensive measures that can be applied, and finally the classification of secure routing protocols, its design issues and their comparison.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"43 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"13","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Computer Science & Engineering Survey","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5121/IJCSES.2011.2414","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 13
Abstract
Wireless sensor networks emerging has increased now a days , therefore the need for effective security mechanisms is essential. Because sensor networks may interact with sensitive data and operate in hostile unattended environments, it is imperative that these security concerns be addressed from the beginning of the system design. we survey the major topics in wireless sensor network security architecture framework includes the requirements in the sensor security, classify many of the current attacks, listing out their corresponding defensive measures that can be applied, and finally the classification of secure routing protocols, its design issues and their comparison.