In this work, novel routing protocols have been proposed which is a cluster-based security protocol is named as Efficient and Secure Routing Protocol (ESRP) for WSN.
The main limitation of this algorithm is the extra overhead at the member nodes.
Load Balancing in WSNEnergy consumption is high due to the number of nodes in the network. A number of experiments have been conducted to ensure energy consumption and predict the error rate in the network. Black hole Attack in WSNIt is one of the major security threats in the wireless sensor network.
In WSN, there are different parameters for clustering which are: Data Aggregation It is another good area for the thesis on wireless sensor network.
Data aggregation is required to process the raw data.
A malicious message can be injected into the network.
An attacker can attack the physical layer of the network. The main security requirements in the network termed as CIA are: The different methods of security in WSN include Symmetric Encryption, Asymmetric Encryption, Hash Function, Digital Signature.
WSN find its application in military, healthcare and hence security is a must.
There is a threat of leakage of private information in the network.
Advances in Wireless Sensor Network (WSN) have provided the availability of small and low-cost sensors with the capability of sensing various types of physical and environmental conditions, data processing, and wireless communication.
Since WSN protocols are application specific, the focus has been given to the routing protocols that might differ depending on the application and network architecture.