Study and Analysis of End-to-End Security Mechanisms in Wireless Sensor Networks

Conference: International Joint Colloquiums on Computer Electronics Electrical Mechanical and Civil
Author(s): Srijana K, Supriya Shetty, K Chandrasekaran Year: 2015
Grenze ID: 02.CEMC.2015.1.17 Page: 23-33

Abstract

In recent days network connections often consists of wired and wireless networking technologies, hence giving way to user mobility and network heterogeneity. In the coming days, we can expect to have intelligent interconnected devices surrounding us everywhere at home, office or even when travelling. This technology will not be well accepted unless users are convinced on the security and privacy of the service, which, at present, has become an uphill task to achieve true ubiquitous network services. These parameters transform the task of securing data in the network into a tedious task. To ensure that a file will be transferred without any corruption we need a security system which works from the source to the destination. However the security provided today is at various layers which makes coordination between them difficult. Hence we need an End-to- End security mechanism to secure the data. In this paper, we present a survey of the various methods as proposed for End-to-End security by researchers. We study the various mechanisms in order to reach onto a better end-to-end secure mechanism for wireless sensor networks connected to the internet. While doing so we also look into other network mechanisms to check if there is any other technique or features of them which may suit our cause. Finally we compare the various techniques to get a better secure mechanism.

<< BACK

CEMC - 2015