• Jun 14, 2017 News!Vol.8, No.5 has been indexed by EI (Inspec).   [Click]
  • Jul 19, 2017 News!Vol.9, No.4 has been published with online version. 16 peer reviewed articles from 16 specific areas are published in this issue.   [Click]
  • Jun 14, 2017 News!Vol.9, No.3 has been published with online version. 15 peer reviewed articles from 8 specific areas are published in this issue.   [Click]
General Information
Editor-in-chief
Prof. Wael Badawy
Department of Computing and Information Systems Umm Al Qura University, Canada
I'm happy to take on the position of editor in chief of IJCTE. We encourage authors to submit papers concerning any branch of computer theory and engineering.
IJCTE 2013 Vol.5(3): 436-439 ISSN: 1793-8201
DOI: 10.7763/IJCTE.2013.V5.725

Grouping Applications for Appropriate Security Provision in WSN

Muhammad Zahir Shah, Aftab Alam, and Gohar Ali
Abstract—Wireless Sensor Networks (WSN) are gaining popularity due to their increasing use in different fields ranging from battlefield monitoring to healthcare services. WSNs are facing serious security challenges primarily due to insecure medium and unattended operations in hostile environments. Extensive studies in this regard have been done to secure WSN through different techniques. In this paper we argue that not all applications require same level of security for their proper operations, since applications do not face same level of hostile environment and motivation of attackers. In response we propose to group the applications according to security requirements which will enable researchers to better understand security issues and develop solutions as per requirements of the application and interests of an attacker.

Index Terms—BROSK, elliptic curve cryptography, LEAP, public key cryptography, sensor node, trusted Server.

Muhammad Zahir Shah is with the Deptt: of Computer Science& IT, Govt. Degree College Lachi K.P.K Pakistan (e-mail: zahirktk@yahoo.com)
Aftab Alam is with the Deptt: of Computer Science & IT University of Malakand Chakdara KPK Pakistan (e-mail: alam@uom.edu.pk).
Gohar Ali is with SRC, NADRA, Peshawar K.P.K Pakistan (e-mail: gauharali@yahoo.com).

[PDF]

Cite:Muhammad Zahir Shah, Aftab Alam, and Gohar Ali, "Grouping Applications for Appropriate Security Provision in WSN," International Journal of Computer Theory and Engineering vol. 5, no. 3, pp. 436-439, 2013.

Copyright © 2008-2015. International Journal of Computer Theory and Engineering. All rights reserved.
E-mail: ijcte@vip.163.com