3925-3937
Survey of Intrusion Detection Techniques and Architectures in Wireless Sensor Networks
Authors: Rakesh Sharma; Vijay Anant Athavale
Number of views: 488
Advances in electronics and wireless communication technologies have enabled the development of large-scale
wireless sensor networks (WSNs). However, WSNs practice from lots of constraints, with low computation capability, small memory, limited energy resources, vulnerability to physical capture, and the need of infrastructure, which enforce lonely security challenges mostly for the applications where confidentiality has key significance. There are diverse applications for wireless sensor networks, and security is very major issue for several
of them. Before attackers can damage the WSN system (i.e., sensor nodes) and/or information destination (i.e., data
sink or base station) in order to work WSNs in a secure way, any sort of intrusions should be detected.