bullet Sensors & Transducers Journal

    (ISSN: 2306-8515, e-ISSN 1726-5479)


2013 Global Impact Factor


2008 e-Impact Factor

25 Top Downloaded Articles

Best Selling Articles 2012

Journal Subscription

Editorial Calendar

Submit an Article

Editorial Board

Current Issue

S&T journal's cover

Sensors & Transducers Journal 2011

Sensors & Transducers Journal 2010

Sensors & Transducers Journal 2009

Sensors & Transducers Journal 2008

Sensors & Transducers Journal 2007

2000-2002 S&T e-Digest Contents

2003 S&T e-Digest Contents

2004 S&T e-Digest Contents

2005 S&T e-Digest Contents

2006 S&T e-Digest Contents


Best Articles 2011




Vol. 186, Issue 3, March 2015, pp. 33-42




A Novel Situation Specific Network Security for Wireless Sensor Networks

1 Mohammad Al-Rousan, 2 Muneer Bani Yassein, 3 Ahmed Al-Dubai, 2 Barraq Ghaleb, 2 Ibrahim Mahmoud

1 College of Computer Science and Engineering, Kuwait University, Kuwait

2 Faculty of Computer & Information Technology, Jordan University of Science and Technology, Irbid, Jordan

3 School of Computing, Edinburgh Napier University, Edinburgh EH10 5DT, UK

E-mail: 1 Alrousan@just.edu.jo, 2 Masadeh@just.edu.jo, 2 ibrahim_mufeed@just.edu.jo, 2 barraq_ghaleb@just.edu.jo, 3 A.Al-Dubai@napier.ac.uk


Received: 22 December 2014 /Accepted: 27 February 2015 /Published: 31 March 2015

Digital Sensors and Sensor Sysstems


Abstract: Researchers have come up with many high level security protocols and key management algorithms that can be applied for different types of networks. The main characteristics of wireless sensor networks that are limited computation and power made it difficult to apply these secure key management algorithms since it consumes much power and resources. Sensors in the field at different periods of time of their life time need higher level of security more than other times - sensors in a battlefield need higher security when it is war time. In our research we developed an adaptive security protocol for two-layer clustered heterogeneous wireless sensor networks that can toggle between five different modes of operation, each with different security level. Each level of security has its own encryption/decryption algorithm and specified key length depending on the situation of the application and the situation for the wireless sensor networks.


Keywords: Sensor network, Security, Key management, Clustered heterogeneous.


Acrobat reader logo Click <here> or title of paper to download the full pages article in pdf format



Subscribe the full-page Sensors & Transducers journal in print (paper) or pdf formats

(shipping cost by standard mail for paper version is included)

(25 % discount for IFSA Members)




Alternatively we accept a money transfer to our bank account. Please contact for details: sales@sensorsportal.com



Download <here> the Library Journal Recommendation Form



Read more about Wireless Sensor Networks






1999 - 2015 Copyright , International Frequency Sensor Association (IFSA) Publishing, S.L. All Rights Reserved.

Home - News - Links - Archives - Tools - Voltage-to-Frequency Converters - Standardization - Patents - Marketplace - Projects - Wish List - e-Shop - Sensor Jobs - Membership - Videos - Publishing - Site Map - Subscribe - Search

 Members Area -Sensors Portal -Training Courses - S&T Digest - For advertisers - Bookstore - Forums - Polls - Submit Press Release - Submit White Paper - Testimonies - Twitter - Facebook - LinkedIn