AN IN-DEPTH ANALYSIS OF WSN SECURITY PROTOCOLS: A SURVEY AND PROSPECTS FOR THE FUTURE
Main Article Content
Abstract
Among the many possible networking systems with intriguing potential opportunities in the future, "Wireless Sensor Networks (WSNs)" has emerged as a competitor. Deployment is made easier with these compact, cheap, and sophisticated "Sensor Nodes (SNs)"; the number of SNs needed depends on the area of coverage and applications. Integrated systems for control, the medical field, ecological tracking (including the observation of volcanoes, agricultural practices, and governance), as well as the identification of sources of radioactivity, are among their prevalent uses. Security within WSN remains a major concern and a continuing area of study, despite its promising qualities. The design, adverse installation site, and unsecured routing system of deployed SNs make them susceptible to a wide range of security threats. WSNs remain vulnerable because sensor nodes have limited bandwidth, range, processing power, and storage. Despite extensive research improving applications and quality of life, fully securing these resource?constrained networks is still challenging. This paper conducted a deep survey that tailored WSN communication threats and examines the key risks and necessary security measures. Additionally, it presents a significant literature review of current security techniques for WSN settings, including "Cryptography," "Key-Management" "Secure-Routing," "Intrusion-Detection System (IDS)," and “Hashing Message-Authentication Code protocols. It concludes by outlining specific challenges in further study that will need attention to empower the security mechanism in WSN
Downloads
Article Details
COPYRIGHT
Submission of a manuscript implies: that the work described has not been published before, that it is not under consideration for publication elsewhere; that if and when the manuscript is accepted for publication, the authors agree to automatic transfer of the copyright to the publisher.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
- The journal allows the author(s) to retain publishing rights without restrictions.
- The journal allows the author(s) to hold the copyright without restrictions.