What are the security requirements of wireless sensor networks?
The so far listed security requirements of WSN are data confidentiality, data integrity, data freshness, and data authentication and availability [12–15].
How is WSN security managed?
Selecting the most appropriate cryptographic method is vital in WSNs as all security services are ensured by cryptography. Cryptographic methods used in WSNs should meet the constraints of sensor nodes and be evaluated by code size, data size, processing time, and power consumption.
Which of the following are features of ZigBee Mcq?
It has the following characteristics:
- Low battery consumption.
- Low cost.
- Low data rate.
- Easy to implement.
- Supports up to 65,000 nodes connected in a network.
- ZigBee can automatically establish its network.
- ZigBee uses small packets compared with WiFi and Bluetooth.
What are different types of wireless sensor networks?
Types of Wireless Sensor Networks
- Terrestrial WSNs.
- Underground WSNs.
- Underwater WSNs.
- Multimedia WSNs.
- Mobile WSNs.
WHAT IS sensor and its applications?
The sensor is an electronic device that measures physical attributes such as temperature, pressure, distance, speed, torque, acceleration, etc., from equipment, appliances, machines and any other systems. Applications classify sensors, Property sensed, Technology used and Systems where they are deployed.
What kind of security support does leap provide in wireless sensor networks?
LEAP is designed to support secure communications in sensor networks; therefore, it provides the basic security ser- vices such as confidentiality and authentication. In addition, LEAP is to meet several security and performance require- ments that are considerably more challenging to sensor net- works.
What is topology control in wireless sensor networks?
Topology control is a technique used in distributed computing to alter the underlying network (modeled as a graph) to reduce the cost of distributed algorithms if run over the resulting graphs. The term “topology control” is used mostly by the wireless ad hoc and sensor networks research community.
Which topology is used in wireless sensor network?
Centralized Wireless Sensor Networks. Centralized networks take directions from a unique device. This central node is responsible for providing network operation services such as node localization, event detection, and traffic routing. A suitable logical topology for this approach is a star.
Are there different types of attacks on wireless sensor networks?
There are different types of attacks against wireless sensor networks. These attacks can be faced by a variety of measurements. Attacks are classified into two types the active attacks and passive attacks. In the active type attack, an attacker attempts to modify or detach the transmitted messages over the network.
Why are there security issues in wireless sensor networks?
Due to the wireless medium that is inherently broadcast in nature, packets may get damaged due to channel errors and conflict will occur, or dropped at highly congested nodes in the network. As well, an attacker can launch Denial-of- Service (DoS) attacks without much effort, etc.
Why are security issues a problem in WSNs?
WSNs have many constraints from which new challenges stand out. The extreme resource limitations of sensor nodes and unreliable communication medium in unattended environments make it very difficult to directly employ the existing security approaches on a sensor platform due to the complexity of the algorithms [2] [4] [6] [8].
Which is more expensive WSNS or underground sensor network?
The underground wireless sensor networks are more expensive than the terrestrial WSNs in terms of deployment, maintenance, and equipment cost considerations and careful planning. The WSNs networks consist of several sensor nodes that are hidden in the ground to monitor underground conditions.