Review of Wireless Sensor Networks

  • Khairi Salem Ahmed Faculty of Science, Department of Information Technology, Bani Waleed University, LIBYA
Keywords: Sensor Nodes, Security, Applications, Wireless


This article presents a study of the state of the art of sensor networks wireless systems, which continue to develop and present a wide variety of Applications. These networks constitute a current and emerging field of study where combines the development of computers, wireless communications and devices mobile phones and integration with other disciplines such as agriculture, biology, medicine, etc. I know presents the main concept, components, topologies, standards, applications, problems and challenges, then delves into security solutions and concludes with basic simulation tools.


Download data is not yet available.


Corral I. & Ana Belén. (2005). Design and implementation of a simulation environment for sensor networks wireless [Engineering from Telecommunication]. Polytechnic University of Cartagena.

RAAP. (2020). Wireless sensor networks.

Gomez M., Francisco. (2021). Sensor networks wireless.

Schaeffer Elisa. (2015). A look at the basics of optimization of sensor networks.

Franco B., Carlos. (2021). Trends: Wireless sensor networks.

TOSSIM. Available at:

Ruiz M., Pedro. (2020). Introduction to sensor networks. Available at:

Zigbee Alliance. Available on:

Vinagre D. & Juan José. (2007). Routing theory in wireless ad hoc networks. Doctoral Thesis, Carlos III University of Madrid.

I. Mironov. (2005). Hash functions: Theory, attacks, and applications. Microsoft Research, Silicon Valley Campus.

L. Lamport. (1981). Password authentication with insecure communication. Commun. ACM, 24(11).

S. Emre Taşçı, E. Bayramoğlu, & A. Levi. (2008). Simple and flexible random key predistribution schemes for wireless sensor networks using deployment knowledge. In: International Conference on Information Security and Assurance.

W. Du, J. Deng, YS Han, S. Chen, & PK Varshney. (2004). A key management scheme for wireless sensor networks using deployment knowledge. IEEE Infocom.

Y. Ho Kim, H. Lee, & D. Hoon Lee. (2007). A secure and efficient key management scheme for wireless sensor networks. In: Security and Privacy in Communications Networks and the Workshops, Secure Comm 2007. Third International Conference, pp. 17-21.

J. Young Chun, Y. Ho Kim, J. Lim, & D. Hoon Lee. (2007). Location-aware random pair-wise keys scheme for wireless sensor networks. In: Third International Workshop on Security Privacy and Trust in Pervasive and Ubiquitous Computing.

J. Luo, P. Papadimitratos, & JP. Hubaux. (2008). GossiCrypt: Wireless sensor network data confidentiality against parasitic adversaries. In: 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

X. Yi, M. Faulkner, & E. Okamoto. (2008). Securing wireless sensor networks. In: Third International Conference on Availability, Reliability and Security.

MIT open Course Aware, Chapter 7: Introduction to finite fields. Electrical Engineering and Science Computing.

A. Shamir. (1979 Nov). How to share a secret. Communications of the ACM, 22(11), 656-715.

A. Hamid, M. Mahbub Alam, & C. Seon Hong. (2007 Feb). Developing a security protocol based on LCG and orthogonal matrices for wireless sensor networks. The 9th International Conference on Advanced Communication Technology.

DE Knuth. (1985). Deciphering a linear congruential encryption. IEEE Transactions on Information Theory, IT-X(1), 49-52.

How to Cite
Khairi Salem Ahmed. (2021). Review of Wireless Sensor Networks. International Journal of Engineering and Management Research, 11(5), 57-63.