Volume 2, Issue 2, June 2014, Pages 301–307
Abdalraouf Hassan1 and Christian Bach2
1 dept. Of Computer Science and Engineering University of Bridgeport Bridgeport, USA
2 University of Bridgeport, Bridgeport, CT 06604, USA
Original language: English
Copyright © 2014 ISSR Journals. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Wireless Sensor Networks (WSNs) have concerned much attention in recent years. The prospective applications of WSNs are massive. They are used for collecting, storing and sharing sensed data. WSNs have been used for various applications including habitat monitoring, agriculture, nuclear reactor control, security and tactical surveillance. Wireless sensor networks are threatened by numerous attacks. Therefore, security is now becoming a significant new path of research and attempts to counter these attacks.
Author Keywords: Cryptography, Steganography, Nodes, WSN's, Authentication, Integrity, Confidentiality.
Abdalraouf Hassan1 and Christian Bach2
1 dept. Of Computer Science and Engineering University of Bridgeport Bridgeport, USA
2 University of Bridgeport, Bridgeport, CT 06604, USA
Original language: English
Copyright © 2014 ISSR Journals. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Abstract
Wireless Sensor Networks (WSNs) have concerned much attention in recent years. The prospective applications of WSNs are massive. They are used for collecting, storing and sharing sensed data. WSNs have been used for various applications including habitat monitoring, agriculture, nuclear reactor control, security and tactical surveillance. Wireless sensor networks are threatened by numerous attacks. Therefore, security is now becoming a significant new path of research and attempts to counter these attacks.
Author Keywords: Cryptography, Steganography, Nodes, WSN's, Authentication, Integrity, Confidentiality.
How to Cite this Article
Abdalraouf Hassan and Christian Bach, “Improving Security Connection in Wireless Sensor Networks,” International Journal of Innovation and Scientific Research, vol. 2, no. 2, pp. 301–307, June 2014.