dc.contributor.author | Ndia, John G. | |
dc.date.accessioned | 2018-01-05T08:24:18Z | |
dc.date.available | 2018-01-05T08:24:18Z | |
dc.date.issued | 2017 | |
dc.identifier.uri | http://hdl.handle.net/123456789/2956 | |
dc.description.abstract | There are numerous wireless sensor network
(WSN) applications being developed day to
day. These applications range from simple
environmental monitoring such as collecting
temperatures in an agricultural farm to
complex applications such as monitoring
battle fields. As the applications increase so
are the attacks. Therefore, several security
protocols have been introduced to be used
with the different applications which have
varying security requirements; this implies
that the choice for the WSNs application
should be well considered. This paper
discusses the wireless sensor network
security requirements, the most common
attacks and the most popular protocols used
with WSNs. Focus is also given to the
strengths and limitations of WSN security
protocols to enable designers of the WSNs
choose the right protocol for their
applications. | en_US |
dc.language.iso | en | en_US |
dc.publisher | International Journal of Applied computer Science | en_US |
dc.subject | WSNs, Security protocol, Security requirement, WSN attacks | en_US |
dc.title | A Survey of Security Protocols for Wireless Sensor Networks | en_US |
dc.type | Article | en_US |