International Research journal of Management Science and Technology

  ISSN 2250 - 1959 (online) ISSN 2348 - 9367 (Print) New DOI : 10.32804/IRJMST

Impact Factor* - 6.2311


**Need Help in Content editing, Data Analysis.

Research Gateway

Adv For Editing Content

   No of Download : 48    Submit Your Rating     Cite This   Download        Certificate

A REVIEW PAPER ON SENSOR NETWORK PROTOCOLS

    1 Author(s):  NANCY MUNJAL

Vol -  4, Issue- 1 ,         Page(s) : 87 - 96  (2013 ) DOI : https://doi.org/10.32804/IRJMST

Abstract

The Wireless Application Protocol (WAP) is a protocol stack for wireless communication networks. WAP uses WTLS, a wireless variant of the SSL/TLS protocol, to secure the communication between the mobile phone and other parts of the WAP architecture. This paper describes the security architecture of WAP and some important properties of the WTLS protocol. There are however some security problems with WAP and the WTLS protocol. Privacy, data protection and integrity are not always provided. Users and developers of WAP applications should be aware of this. In this paper, we address the security weaknesses of WAP and WTLS and propose some countermeasures and good practices when using WAP. We conclude with advising when to use WAP and when not.

  1. W. Heinzelman, J. Kulik, and H. Balakrishnan, “Adaptive protocols for information dissemination in wireless sensor networks,” in the Proceedings of the 5th Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom’99), Seattle, WA, August 1999.
  2. C. Intanagonwiwat, R. Govindan, D. Estrin, J. Heidemann, and F. Silva,“Directed Diffusion for Wireless Sensor Networking,” IEEE/ACM Transactions on Networking, vol. 11, pp. 2–16, Feb 2003.
  3. Z.Modi,S.Jardon,P.Ranjan,”Optimized Rumor Routing Algorithm for Wireless Sensor Networks”, Fifth IEEE Conference on Wireless Communication and Sensor Networks (WCSN-2009) December 15-19, 2009
  4. F. Zabin,S.Mishra,I.Woungang,” A Power-Aware Routing Scheme for Wireless Sensor Networks”, 7th WSEAS International Conference on APPLIED COMPUTER SCIENCE, Venice, Italy, November 21-23, 2007
  5. Y. Yao and J. Gehrke, “The cougar approach to in-network query processing in sensor networks,” in SIGMOD Record, September 2002.
  6. K. Akkaya and M. Younis,”A Survey on Routing Protocols for Wireless Sensor Networks”,in SCIENCE DIRECT record,November 2003
  7. M. Singh, M.Sethi, N. Lal,S. Poonia,” A Tree Based Routing Protocol for Mobile Sensor Networks (MSNs)” IJCSE International Journal on Computer Science and Engineering,Vol. 02, No.01S, 55-60,2010.
  8. S. Lindsey and C. S. Raghavendra, "PEGASIS: Power Efficient GAthering in Sensor Information Systems," in the Proceedings of the IEEE Aerospace Conference, Big Sky, Montana, March 2002.
  9. M. Bani Yassein, A. Al-zou'bi, Y. Khamayseh, W. Mardini,” Improvement on LEACH Protocol of Wireless Sensor Network (VLEACH)”, International Journal of Digital Content Technology and its Applications Volume 3, Number 2, June 2009.
  10. A. Manjeshwar and D. P. Agrawal, “TEEN : A Protocol for Enhanced Efficiency in Wireless Sensor Networks," in the Proceedings of the 1st International Workshop on Parallel and Distributed Computing Issues in Wireless Networks and Mobile Computing, San Francisco, CA,April 2001.
  11. M. Younis, M. Youssef and K. Arisha, “Energy-Aware Routing in Cluster-Based Sensor Networks”, in the Proceedings of the 10th IEEE/ACM International Symposium on Modeling,Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS2002), Fort Worth, TX, October 2002.

*Contents are provided by Authors of articles. Please contact us if you having any query.






Bank Details