preview

The Problem Of Wireless Sensor Networks

Decent Essays

Wireless sensor networks (WSNs) are presented their abilities in many vital applications such as wildlife tracking, checking heart rates of human, military applications, traffic monitoring, etc, [1]. Wireless sensors have limited resources, including limited storage, limited processing facility, and communication capability. In addition, each sensor node is powered by a battery, which has a finite size and cannot be recharged or replaced due to environmental conditions [2-5]. Actually, Sensor nodes depend on their finite resources to survive. Due to these reasons, it is important to enhance the energy efficiency of nodes to improve the quality of the application service REF. The first problem of WSNs is to minimize energy consumption in …show more content…

Since data are transmitted wirelessly between sensor nodes, it is usually prone to eavesdropping and interception. It is important to maintain the privacy of data among sensor nodes even from trusted cooperating sensor nodes of the WSNs. It is necessary to prevent recovering the privacy of the data, even it is overheard or decrypted by the adversaries.
The last problem of WSNs is data integrity REF . Data integrity is defined as the correctness of messages without injection a false data by an adversary. It is ensured that the received message is not modified or altered through its transmission by noise or by an adversary. If data message is polluted by a noise it can be handled by using some mechanisms such as Cyclic Redundancy Checking (CRC). This unintentional process is out of our scope of this paper. The data aggregation result is essential for making a critical decision, thus it is required to verify data aggregation result before accepting it.
Generally, the success of wireless sensor network depends on a vital secure data aggregation technique that accomplishes the security goals [8]. However, the security models and protocols of sensor networks are different from those that are used in other types of networks due to their hardware resources and power constraints. Therefore, efficient, secure data aggregation techniques are required to deal with energy efficiency, data accuracy, latency and protecting data.
In this paper, we introduce a better

Get Access