International Journal of Computer Theory and Engineering

Editor-In-Chief: Prof. Mehmet Sahinoglu
Frequency: Quarterly
ISSN: 1793-8201 (Print), 2972-4511 (Online)
Publisher:IACSIT Press
OPEN ACCESS
4.1
CiteScore

⚠️ Important Security Notice: Beware of Fraudulent Emails Impersonating IJCTE Officials
IJCTE 2013 Vol.5(3): 436-439 ISSN: 1793-8201
DOI: 10.7763/IJCTE.2013.V5.725

Grouping Applications for Appropriate Security Provision in WSN

Muhammad Zahir Shah, Aftab Alam, and Gohar Ali

Abstract—Wireless Sensor Networks (WSN) are gaining popularity due to their increasing use in different fields ranging from battlefield monitoring to healthcare services. WSNs are facing serious security challenges primarily due to insecure medium and unattended operations in hostile environments. Extensive studies in this regard have been done to secure WSN through different techniques. In this paper we argue that not all applications require same level of security for their proper operations, since applications do not face same level of hostile environment and motivation of attackers. In response we propose to group the applications according to security requirements which will enable researchers to better understand security issues and develop solutions as per requirements of the application and interests of an attacker.

Index Terms—BROSK, elliptic curve cryptography, LEAP, public key cryptography, sensor node, trusted Server.

Muhammad Zahir Shah is with the Deptt: of Computer Science& IT, Govt. Degree College Lachi K.P.K Pakistan (e-mail: zahirktk@yahoo.com)
Aftab Alam is with the Deptt: of Computer Science & IT University of Malakand Chakdara KPK Pakistan (e-mail: alam@uom.edu.pk).
Gohar Ali is with SRC, NADRA, Peshawar K.P.K Pakistan (e-mail: gauharali@yahoo.com).

[PDF]

Cite:Muhammad Zahir Shah, Aftab Alam, and Gohar Ali, "Grouping Applications for Appropriate Security Provision in WSN," International Journal of Computer Theory and Engineering vol. 5, no. 3, pp. 436-439, 2013.

Article Metrics in Dimensions

Menu