AN IN-DEPTH ANALYSIS OF WSN SECURITY PROTOCOLS: A SURVEY AND PROSPECTS FOR THE FUTURE

Main Article Content

Kanagaraj Janarthanan
Dr M. Sengalliappan

Abstract

Among the many possible networking systems with intriguing potential opportunities in the future, "Wireless Sensor Networks (WSNs)" has emerged as a competitor. Deployment is made easier with these compact, cheap, and sophisticated "Sensor Nodes (SNs)"; the number of SNs needed depends on the area of coverage and applications. Integrated systems for control, the medical field, ecological tracking (including the observation of volcanoes, agricultural practices, and governance), as well as the identification of sources of radioactivity, are among their prevalent uses. Security within WSN remains a major concern and a continuing area of study, despite its promising qualities. The design, adverse installation site, and unsecured routing system of deployed SNs make them susceptible to a wide range of security threats. WSNs remain vulnerable because sensor nodes have limited bandwidth, range, processing power, and storage. Despite extensive research improving applications and quality of life, fully securing these resource?constrained networks is still challenging. This paper conducted a deep survey that tailored WSN communication threats and examines the key risks and necessary security measures. Additionally, it presents a significant literature review of current security techniques for WSN settings, including "Cryptography," "Key-Management" "Secure-Routing," "Intrusion-Detection System (IDS)," and “Hashing Message-Authentication Code protocols. It concludes by outlining specific challenges in further study that will need attention to empower the security mechanism in WSN

Downloads

Download data is not yet available.

Article Details

Section
Articles