Open Access   Article Go Back

An Overview of Wireless Sensor Networks (WSN): Applications and Security

Aishwarya Kumar1 , Awadhesh Kumar2

Section:Review Paper, Product Type: Journal Paper
Volume-7 , Issue-7 , Page no. 98-100, Jul-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i7.98100

Online published on Jul 31, 2019

Copyright © Aishwarya Kumar, Awadhesh Kumar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Aishwarya Kumar, Awadhesh Kumar, “An Overview of Wireless Sensor Networks (WSN): Applications and Security,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.7, pp.98-100, 2019.

MLA Style Citation: Aishwarya Kumar, Awadhesh Kumar "An Overview of Wireless Sensor Networks (WSN): Applications and Security." International Journal of Computer Sciences and Engineering 7.7 (2019): 98-100.

APA Style Citation: Aishwarya Kumar, Awadhesh Kumar, (2019). An Overview of Wireless Sensor Networks (WSN): Applications and Security. International Journal of Computer Sciences and Engineering, 7(7), 98-100.

BibTex Style Citation:
@article{Kumar_2019,
author = {Aishwarya Kumar, Awadhesh Kumar},
title = {An Overview of Wireless Sensor Networks (WSN): Applications and Security},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {7 2019},
volume = {7},
Issue = {7},
month = {7},
year = {2019},
issn = {2347-2693},
pages = {98-100},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4728},
doi = {https://doi.org/10.26438/ijcse/v7i7.98100}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i7.98100}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4728
TI - An Overview of Wireless Sensor Networks (WSN): Applications and Security
T2 - International Journal of Computer Sciences and Engineering
AU - Aishwarya Kumar, Awadhesh Kumar
PY - 2019
DA - 2019/07/31
PB - IJCSE, Indore, INDIA
SP - 98-100
IS - 7
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
455 365 downloads 216 downloads
  
  
           

Abstract

Wireless correspondence innovations keep on experiencing fast headway. Wireless sensor nodes have restricted handling capacity, store-up and active minerals. The presence of sensor network rely on the life of sensor nodes i.e., eventually on the energy inhalation during its procedure. Therefore, in WSN, the effective use of energy resources is very much essential. Clustering is one of the viewpoints for energy saving in WSN. As of late, there has been a lofty development in research in the zone of Wireless sensor systems (WSNs). In WSNs, correspondence happens with the assistance of spatially dispersed, self-governing sensor hubs prepared to detect explicit data. WSNs can be found in an assortment of both military and regular citizen applications around the world. Models incorporate recognizing adversary interruption on the war zone, object following, natural surroundings checking, tolerant observing and fire recognition. Sensor systems are rising as an alluring innovation with extraordinary guarantee for what`s to come. Nonetheless, challenges stay to be tended to in issues identifying with inclusion and arrangement, versatility, nature of-administration, estimate, computational power, vitality proficiency and security. This paper exhibits an outline of the various utilizations of the wireless sensor systems and different security related issues in WSNs.

Key-Words / Index Term

Wireless, Network, Self-governing, Explicit Data

References

[1] J. Hill, R. Szewczyk, A, Woo, S. Hollar, D. Culler, and K. Pister, “System Architecture Directions for Networked Sensors”, ASPLOS, November 2000.
[2] Culler, D. E and Hong, W., “Wireless Sensor Networks”, Communication of the ACM, Vol. 47, No. 6, pp. 30-33, June 2004.
[3] Undercoffer, J., Avancha, S., Joshi, A., and Pinkston, J., “Security for Sensor Networks”, CADIP Research Symposium, 2002.
[4] A.D. Wood and J.A. Stankovic, (2002) “Denial of Service in Sensor Networks,” Computer, vol. 35, no. 10, pp. 54– 62, 2002.
[5] J. R. Douceur, “The Sybil Attack,” in 1st International Workshop on Peer-to-Peer Systems (IPTPS ‟02), 2002.
[6] Zaw Tun and Aung Htein Maw, “Worm hole Attack Detection in Wireless Sensor networks”, proceedings of world Academy of Science, Engineering and Technology Volume 36, ISSN 2070-3740, December 2008.