—Wireless Sensor Networks (WSN) are gaining popularity due to their increasing use in different fields ranging from battlefield monitoring to healthcare services. WSNs are facing serious security challenges primarily due to insecure medium and unattended operations in hostile environments. Extensive studies in this regard have been done to secure WSN through different techniques. In this paper we argue that not all applications require same level of security for their proper operations, since applications do not face same level of hostile environment and motivation of attackers. In response we propose to group the applications according to security requirements which will enable researchers to better understand security issues and develop solutions as per requirements of the application and interests of an attacker.
—BROSK, elliptic curve cryptography, LEAP, public key cryptography, sensor node, trusted Server.
Muhammad Zahir Shah is with the Deptt: of Computer Science& IT, Govt. Degree College Lachi K.P.K Pakistan (e-mail: firstname.lastname@example.org)
Aftab Alam is with the Deptt: of Computer Science & IT University of Malakand Chakdara KPK Pakistan (e-mail: email@example.com).
Gohar Ali is with SRC, NADRA, Peshawar K.P.K Pakistan (e-mail: firstname.lastname@example.org).
Cite:Muhammad Zahir Shah, Aftab Alam, and Gohar Ali, "Grouping Applications for Appropriate Security Provision in WSN," International Journal of Computer Theory and Engineering vol. 5, no. 3, pp. 436-439, 2013.