Analysis on Security Methods of Wireless Sensor Network (WSN)
Security has always been a major area of concern for WSN. Due to limited resources and size constrain of a node, WSN still lacks a comprehensive security mechanism for its operations. In this paper, some of the purposed security methods for WSN are being analyzed for the issues that still exist in the purposed security method. To perform the analysis on security methods some of the documented or implemented security algorithm by researchers are being studied and the issues with those algorithms are being highlighted. After performing the analysis it is quite clear that most of the algorithm being purposed by researchers for WSN need to be designed keeping in view resources constrains of WSN.
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
The SJCMS holds the rights of all the published papers. Authors are required to transfer copyrights to journal to make sure that the paper is solely published in SJCMS, however, authors and readers can freely read, download, copy, distribute, print, search, or link to the full texts of its articles and to use them for any other lawful purpose.
The SJCMS is licensed under Creative Commons Attribution-NonCommercial 4.0 International License.