Anazida Zainal
Universiti Teknologi Malaysia

Published : 2 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 2 Documents
Search

Security in Wireless sensor network: Approaches and Issues Raja Waseem Anwar; Majid Bakhtiari; Anazida Zainal; Kashif Naseer Qureshi
Indonesian Journal of Electrical Engineering and Computer Science Vol 15, No 3: September 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v15.i3.pp584-590

Abstract

Wireless sensor network is a tremendous emerging technology provides communication services for environmental monitoring and target tracking for mass public and military. With increasing of this smart network popularity sensor network faced various challenges and threats. The inclusion of wireless sensor nodes also incurs different types of security threats in network. Mostly networks are using shared key approaches to make less communication overhead, but still network compromise with replay impersonation and compromise attacks. The existing proposed schemes are not fully addressed other network resources such as energy and speed, etc.  The intent of this paper is to provide a comprehensive security requirement, detail about security attacks in network and discuss the existing security schemes.
Systematic literature review on designing trust-based security for WSNs Raja waseem Anwar; Anazida Zainal; Saleem Iqbal
Indonesian Journal of Electrical Engineering and Computer Science Vol 14, No 3: June 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v14.i3.pp1395-1404

Abstract

The study assessed the design and development of trust-based security for wireless sensor networks. A qualitative approach was opted by employing systematic review analysis, which was assessed using secondary data collection. The design and development of trust-based security were mainly targeted, and 140 publications were randomly reviewed, from which 24 studies were finalized after excluding irrelevant data and studies that only contained abstracts. The results were analyzed focusing on the designs, applications and protocols and trust factors. Different studies have been evaluated, which have suggested that proper design and development of trust-based security should be the foremost aim to be applied in user environments. The study suggested that designing the trust management models based on the taxonomy of routing applications and relevant algorithms could be a part of future investigations.