Loading

Security Breaches and their Solutions in WSN
Md. Aleemuddin Ghori1, Syed Abdul Sattar2

1Dr. Md Aleemuddin Ghori, Professor, Department of CSE, Royal Institute of Technology & Science, Chevella (Telangana), India.
2Dr. Syed Abdul Sattar, Professor & Dean of Academics, Royal Institute of Technology & Science, Chevella (Telangana), India.

Manuscript received on 15 June 2015 | Revised Manuscript received on 25 June 2015 | Manuscript Published on 30 June 2015 | PP: 74-76 | Volume-4 Issue-5, June 2015 | Retrieval Number: E4031064515/15©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Wireless sensor network is an upcoming technology and are getting Popularity quickly and a lot of attention because of their low cost solutions to a number of large sensor arrays, and capable to implement in military as well as for civilians. This technology has many applications including various environmental monitoring; target tracking, scientific exploration, patient monitoring and tracking, and data acquisition in hazardous environments. Sensor nodes are deployed in a hostile locations security becomes extremely important. They have limited data storage and power capacity because of their small size and this is the major limitation to implement the traditional computer security methods. The unpredictable communication channel and unattended operation make the security defenses harder. In this paper we have discussed the importance of security breaches and their solutions.
Keywords: Popularity Quickly, Large Sensor Arrays, Various Environmental Monitoring; Target Tracking, Scientific Exploration, Patient Monitoring.

Scope of the Article: WSN