International Journal of Soft Computing and Engineering (IJSCE)
While much research has focused on making sensor networks that feasible and useful security has received little attention. The authors present a set of security protocols optimized for sensor networks: they are confidentiality and authentication, data freshness, data integrity. By using the sensor network encryption protocol, they explain the basic primitives for providing confidentiality, authentication between the two nodes, data integrity and message freshness present in a wireless sensor network. That was designed as base component of security protocols for sensor networks.