7. Conclusion
The modern wireless sensor networks are deployed in a non-enclosed environment. Due to this nature of wireless sensor networks, many security issues arise and hence, wireless sensor networks are vulnerable to attacks. In this report, we consider three application scenarios and security vulnerabilities are exposed based on these applications. This report studies various aspects associated with security issues in wireless sensor networks. The key findings in above research indicate that wireless sensor networks are used in mission critical applications. At the same time, security issues in wireless sensor networks are also equally high.
In this study, we had a thorough analysis with existing solutions which mainly account for security vulnerabilities. The study on cryptographic methods and intrusion detection mechanisms are thoroughly analyzed and acknowledged in this context. Intrusion detection systems are responsible in identification of possible intruders and cryptographic methods play a key role in prevention of attacks. Hence for this purpose, we need an efficient cryptographic system. Since wireless sensor networks are resource constrained, the methodologies need to be feasible and best suited to provide optimal security with minimum resource utilization.