Show simple item record

dc.contributor.authorNdia, John G.
dc.date.accessioned2018-01-05T08:24:18Z
dc.date.available2018-01-05T08:24:18Z
dc.date.issued2017
dc.identifier.urihttp://hdl.handle.net/123456789/2956
dc.description.abstractThere are numerous wireless sensor network (WSN) applications being developed day to day. These applications range from simple environmental monitoring such as collecting temperatures in an agricultural farm to complex applications such as monitoring battle fields. As the applications increase so are the attacks. Therefore, several security protocols have been introduced to be used with the different applications which have varying security requirements; this implies that the choice for the WSNs application should be well considered. This paper discusses the wireless sensor network security requirements, the most common attacks and the most popular protocols used with WSNs. Focus is also given to the strengths and limitations of WSN security protocols to enable designers of the WSNs choose the right protocol for their applications.en_US
dc.language.isoenen_US
dc.publisherInternational Journal of Applied computer Scienceen_US
dc.subjectWSNs, Security protocol, Security requirement, WSN attacksen_US
dc.titleA Survey of Security Protocols for Wireless Sensor Networksen_US
dc.typeArticleen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record