2018
DOI: 10.26438/ijcse/v6i10.436444
|View full text |Cite
|
Sign up to set email alerts
|

Security Issues and Comparative Analysis of Security Protocols in Wireless Sensor Networks A Review

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…Most of the work on the MAC protocols focuses primarily on the energy efficiency in the sensor networks. However, still a lot of work has to be done in the other areas at the MAC layer such as: Sensor Network Security [28], Nodes Mobility [29], Evaluation on Real Sensor Platforms, Real Time Systems [30], Underground WSN, Underwater WSN and Multi-media WSN [31].…”
Section: Discussionmentioning
confidence: 99%
“…Most of the work on the MAC protocols focuses primarily on the energy efficiency in the sensor networks. However, still a lot of work has to be done in the other areas at the MAC layer such as: Sensor Network Security [28], Nodes Mobility [29], Evaluation on Real Sensor Platforms, Real Time Systems [30], Underground WSN, Underwater WSN and Multi-media WSN [31].…”
Section: Discussionmentioning
confidence: 99%
“…In the pursuit of enhancing security management systems within Wireless Sensor Network (WSNs) for Big Data, optimization algorithms play a pivotal role. This chapter delves into the utilization of Gray Wolf Optimization (GWO) as a key component in achieving efficient resource allocation, optimizing node placement, and improving data transmission efficiency within the WSN [1]. The mathematical foundation of GWO will be explored in detail to provide a comprehensive understanding of its application in security enhancement.…”
Section: Introductionmentioning
confidence: 99%
“…WSN [1,2,3] is a huge collection of small sensor nodes having the capability of sensing, storing and handling of information. The sensor devices can be considered stress, strain, echo, heat and chemical combination.…”
Section: Introductionmentioning
confidence: 99%