Challenges of Wireless Sensor Networks
VerifiedAdded on 2020/02/24
|6
|1603
|65
AI Summary
This assignment delves into the inherent security challenges associated with Wireless Sensor Networks (WSNs). It highlights the vulnerabilities stemming from wireless communication technology, battery-operated nature, and the use of sensors to collect sensitive information. The text emphasizes the need for extensive research and robust solutions to address these threats effectively.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: ANNOTED BIBLIOGRAPHY
Professional Skills Development
[Annoted Bibliography]
Name of the student:
Name of the university:
Author note:
Professional Skills Development
[Annoted Bibliography]
Name of the student:
Name of the university:
Author note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1ANNOTED BIBLIOGRAPHY
1) Manshaei, M. H., Zhu, Q., Alpcan, T., Bacşar, T., & Hubaux, J. P. (2013). Game
theory meets network security and privacy. ACM Computing Surveys (CSUR), 45(3), 25.
Authors have expressed their deep thoughts on the existing scenario of security and privacy,
which is being brought into danger because of the advent of numerous technologies and
computer applications. The increasing demand of contemporary business have attracted many
software-developing companies to bring newest and updated version of different software in
the market. An evident transition from manual works to computerised works has been
observed in many companies in particular the multinational companies. In order to be
competitive such companies look for various new opportunities in the form of software.
Different multinational companies for an example use Enterprise Resource planning (ERP)
system to increase their efficiency level in various important works such as sales and
accounting related works. ERP provide multitasking capabilities to such companies; however,
it also has some security related threats, which the authors have felt with all most computer
application nowadays. Software developer can easily access to “soft coded” region where
they can make unwanted changes, which may also be a fatal for the organisational
performance.
2) Chen, Z., Han, F., Cao, J., Jiang, X., & Chen, S. (2013). Cloud computing-based
forensic analysis for collaborative network security management system. Tsinghua
science and technology, 18(1), 40-50.
The use of internet has increased to a new level in nowadays. The advent of e-commerce has
enhanced the use of internet to a next level. However, security related issues have now also
become common with such advents. The use of e-commerce for various business purposes
has enhanced the business success and the standard of customer service. However, on the
other hand, it has also become a threatening platform for security related facts. Many
customers do not even know that their important information might land into corrupted
hands. Different malicious software is being prepared either to corrupt the data stored in the
system or to collect the data of customers without giving any prior intimation to the customer.
Software developing companies now have enhanced work demands, which include finding
solution for the identified threat. Such software developing companies have now developed
cloud based security system, which would collect necessary data on the suspicious threat by
1) Manshaei, M. H., Zhu, Q., Alpcan, T., Bacşar, T., & Hubaux, J. P. (2013). Game
theory meets network security and privacy. ACM Computing Surveys (CSUR), 45(3), 25.
Authors have expressed their deep thoughts on the existing scenario of security and privacy,
which is being brought into danger because of the advent of numerous technologies and
computer applications. The increasing demand of contemporary business have attracted many
software-developing companies to bring newest and updated version of different software in
the market. An evident transition from manual works to computerised works has been
observed in many companies in particular the multinational companies. In order to be
competitive such companies look for various new opportunities in the form of software.
Different multinational companies for an example use Enterprise Resource planning (ERP)
system to increase their efficiency level in various important works such as sales and
accounting related works. ERP provide multitasking capabilities to such companies; however,
it also has some security related threats, which the authors have felt with all most computer
application nowadays. Software developer can easily access to “soft coded” region where
they can make unwanted changes, which may also be a fatal for the organisational
performance.
2) Chen, Z., Han, F., Cao, J., Jiang, X., & Chen, S. (2013). Cloud computing-based
forensic analysis for collaborative network security management system. Tsinghua
science and technology, 18(1), 40-50.
The use of internet has increased to a new level in nowadays. The advent of e-commerce has
enhanced the use of internet to a next level. However, security related issues have now also
become common with such advents. The use of e-commerce for various business purposes
has enhanced the business success and the standard of customer service. However, on the
other hand, it has also become a threatening platform for security related facts. Many
customers do not even know that their important information might land into corrupted
hands. Different malicious software is being prepared either to corrupt the data stored in the
system or to collect the data of customers without giving any prior intimation to the customer.
Software developing companies now have enhanced work demands, which include finding
solution for the identified threat. Such software developing companies have now developed
cloud based security system, which would collect necessary data on the suspicious threat by
2ANNOTED BIBLIOGRAPHY
auctioning remotely from other end. Suspicious threats can now easily be traced with
comparatively faster speed.
3) He, X., Chomsiri, T., Nanda, P., & Tan, Z. (2014). Improving cloud network security
using the Tree-Rule firewall. Future generation computer systems, 30, 116-126.
The firewall security used in the cloud security system was inefficient in mitigating the effect
of threats on a large network. This is because of such reason the developing companies have
now produced Tree-Rule firewall, which would be comparatively more secured than the
existing firewall system. The latest firewall security has been tested by applying this on the
Linux platform. The arrangement was tested on a regular network. The test has shown the
validity of the new software. The newly launched platform offered enhanced security and the
same has offered an improved functional speed than its predecessor. Additionally, it is easy to
be created as well. This can be easily configured within the system without much hassle.
Such speciality is more valid at some larger network such as the cloud network.
4) Inukollu, V. N., Arsi, S., & Ravuri, S. R. (2014). Security issues associated with big
data in cloud computing. International Journal of Network Security & Its
Applications, 6(3), 45.
Authors have argued that cloud computing is associated with many other issues and
challenges as well. One of such issues is related with the Big Data, which is now largely used
by different SMEs, multinational companies and industries. With the help of Big Data,
different kinds of companies have enhanced their competitive skills at a larger speed. These
software applications have now become a huge resource to enhance the competitiveness. To
address this issue, software-developing companies have now become involved in developing
solutions at rapid speed. This has also produced competition in between different companies
that develops the different software. Big Data tool has a very important role in the output
performance of cloud computing. With the help of Big Data, Cloud Computing provides
solutions for security, data protection and related infrastructure. Nevertheless, cloud
computing with the help of big data has constructed the probability to create promising
feature in science.
auctioning remotely from other end. Suspicious threats can now easily be traced with
comparatively faster speed.
3) He, X., Chomsiri, T., Nanda, P., & Tan, Z. (2014). Improving cloud network security
using the Tree-Rule firewall. Future generation computer systems, 30, 116-126.
The firewall security used in the cloud security system was inefficient in mitigating the effect
of threats on a large network. This is because of such reason the developing companies have
now produced Tree-Rule firewall, which would be comparatively more secured than the
existing firewall system. The latest firewall security has been tested by applying this on the
Linux platform. The arrangement was tested on a regular network. The test has shown the
validity of the new software. The newly launched platform offered enhanced security and the
same has offered an improved functional speed than its predecessor. Additionally, it is easy to
be created as well. This can be easily configured within the system without much hassle.
Such speciality is more valid at some larger network such as the cloud network.
4) Inukollu, V. N., Arsi, S., & Ravuri, S. R. (2014). Security issues associated with big
data in cloud computing. International Journal of Network Security & Its
Applications, 6(3), 45.
Authors have argued that cloud computing is associated with many other issues and
challenges as well. One of such issues is related with the Big Data, which is now largely used
by different SMEs, multinational companies and industries. With the help of Big Data,
different kinds of companies have enhanced their competitive skills at a larger speed. These
software applications have now become a huge resource to enhance the competitiveness. To
address this issue, software-developing companies have now become involved in developing
solutions at rapid speed. This has also produced competition in between different companies
that develops the different software. Big Data tool has a very important role in the output
performance of cloud computing. With the help of Big Data, Cloud Computing provides
solutions for security, data protection and related infrastructure. Nevertheless, cloud
computing with the help of big data has constructed the probability to create promising
feature in science.
3ANNOTED BIBLIOGRAPHY
5) Kumar, V., Jain, A., & Barwal, P. N. (2014). Wireless sensor networks: security
issues, challenges and solutions. International Journal of Information and Computation
Technology (IJICT), 4(8), 859-868.
According to the authors, wireless sensor networks (WSN) are a promising technology. The
emerging prospect for the technology has also brought researcher under ample of pressure for
bringing solutions to the challenges that are certain with WSN. It also has wireless
communication technology, which is a more threat to the application. One of the basic
functions of WSN is to collect data from the physical world. WSN can work in any
environment in particular such environment where wire connection is not possible. However,
in such cases, the security related threats would also be at high stake. These are often used to
sense the information of the targeted physical platform. Moreover, it is a battery-operated
device, which has in it a sensor. It is loaded with many features such as communication
mechanism and data processing. However, the authors have argued that it comes with many
challenges as well. Such challenges would require an extensive work from the research team.
5) Kumar, V., Jain, A., & Barwal, P. N. (2014). Wireless sensor networks: security
issues, challenges and solutions. International Journal of Information and Computation
Technology (IJICT), 4(8), 859-868.
According to the authors, wireless sensor networks (WSN) are a promising technology. The
emerging prospect for the technology has also brought researcher under ample of pressure for
bringing solutions to the challenges that are certain with WSN. It also has wireless
communication technology, which is a more threat to the application. One of the basic
functions of WSN is to collect data from the physical world. WSN can work in any
environment in particular such environment where wire connection is not possible. However,
in such cases, the security related threats would also be at high stake. These are often used to
sense the information of the targeted physical platform. Moreover, it is a battery-operated
device, which has in it a sensor. It is loaded with many features such as communication
mechanism and data processing. However, the authors have argued that it comes with many
challenges as well. Such challenges would require an extensive work from the research team.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
4ANNOTED BIBLIOGRAPHY
References
Ahmed, M., & Hossain, M. A. (2014). Cloud computing and security issues in the
cloud. International Journal of Network Security & Its Applications, 6(1), 25.
Chen, Z., Han, F., Cao, J., Jiang, X., & Chen, S. (2013). Cloud computing-based forensic
analysis for collaborative network security management system. Tsinghua science and
technology, 18(1), 40-50.
Hashizume, K., Rosado, D. G., Fernández-Medina, E., & Fernandez, E. B. (2013). An
analysis of security issues for cloud computing. Journal of Internet Services and
Applications, 4(1), 5.
He, X., Chomsiri, T., Nanda, P., & Tan, Z. (2014). Improving cloud network security using
the Tree-Rule firewall. Future generation computer systems, 30, 116-126.
Inukollu, V. N., Arsi, S., & Ravuri, S. R. (2014). Security issues associated with big data in
cloud computing. International Journal of Network Security & Its Applications, 6(3),
45.
Kumar, V., Jain, A., & Barwal, P. N. (2014). Wireless sensor networks: security issues,
challenges and solutions. International Journal of Information and Computation
Technology (IJICT), 4(8), 859-868.
Manshaei, M. H., Zhu, Q., Alpcan, T., Bacşar, T., & Hubaux, J. P. (2013). Game theory
meets network security and privacy. ACM Computing Surveys (CSUR), 45(3), 25.
Modi, C., Patel, D., Borisaniya, B., Patel, A., & Rajarajan, M. (2013). A survey on security
issues and solutions at different layers of Cloud computing. The Journal of
Supercomputing, 63(2), 561-592.
Perlman, R., Kaufman, C. and Speciner, M., (2016). Network security: private
communication in a public world. Pearson Education India.
Rhodes-Ousley, M., (2013). Information security the complete reference. McGraw Hill
Professional.
References
Ahmed, M., & Hossain, M. A. (2014). Cloud computing and security issues in the
cloud. International Journal of Network Security & Its Applications, 6(1), 25.
Chen, Z., Han, F., Cao, J., Jiang, X., & Chen, S. (2013). Cloud computing-based forensic
analysis for collaborative network security management system. Tsinghua science and
technology, 18(1), 40-50.
Hashizume, K., Rosado, D. G., Fernández-Medina, E., & Fernandez, E. B. (2013). An
analysis of security issues for cloud computing. Journal of Internet Services and
Applications, 4(1), 5.
He, X., Chomsiri, T., Nanda, P., & Tan, Z. (2014). Improving cloud network security using
the Tree-Rule firewall. Future generation computer systems, 30, 116-126.
Inukollu, V. N., Arsi, S., & Ravuri, S. R. (2014). Security issues associated with big data in
cloud computing. International Journal of Network Security & Its Applications, 6(3),
45.
Kumar, V., Jain, A., & Barwal, P. N. (2014). Wireless sensor networks: security issues,
challenges and solutions. International Journal of Information and Computation
Technology (IJICT), 4(8), 859-868.
Manshaei, M. H., Zhu, Q., Alpcan, T., Bacşar, T., & Hubaux, J. P. (2013). Game theory
meets network security and privacy. ACM Computing Surveys (CSUR), 45(3), 25.
Modi, C., Patel, D., Borisaniya, B., Patel, A., & Rajarajan, M. (2013). A survey on security
issues and solutions at different layers of Cloud computing. The Journal of
Supercomputing, 63(2), 561-592.
Perlman, R., Kaufman, C. and Speciner, M., (2016). Network security: private
communication in a public world. Pearson Education India.
Rhodes-Ousley, M., (2013). Information security the complete reference. McGraw Hill
Professional.
5ANNOTED BIBLIOGRAPHY
Shin, S., Wang, H., & Gu, G. (2015). A first step toward network security virtualization: from
concept to prototype. IEEE Transactions on Information Forensics and
Security, 10(10), 2236-2249.
Stallings, W., & Tahiliani, M. P. (2014). Cryptography and network security: principles and
practice (Vol. 6). London: Pearson.
Shin, S., Wang, H., & Gu, G. (2015). A first step toward network security virtualization: from
concept to prototype. IEEE Transactions on Information Forensics and
Security, 10(10), 2236-2249.
Stallings, W., & Tahiliani, M. P. (2014). Cryptography and network security: principles and
practice (Vol. 6). London: Pearson.
1 out of 6
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.