Main Menu

My Account
Online Free Samples
   Free sample   Article review wireless sensor network

Article Review On Wireless Sensor Network


The purpose of this assignment is to help you understand how research is conducted and reported in
Information Technology related fields. You are asked to read a peer-reviewed article from a scholarly
journal in the field of Advance Networking and Communication Systems. Articles of this type will
typically report on original research or replications of previously conducted experiments, or they will
be literature reviews in which the author(s) present the results of a literature search on a specific
topic. In the latter case, the article will usually be a dissertation on the most current thinking on a
specific topic.
Task1: Locate an appropriate article
• You can download any per reviewed journal from the field of Information Technology,
Networking and Advance Communication Systems that includes security.
• You should limit your search to:
Full text
Scholarly (peer reviewed) journals
Published in the past 5 years
Or, you can come and see your lecturer during office hours, or during consultation hours.
Task 2: Summarize and discuss the content of article.
Task 3: Explain and critique the methods used and/or the findings presented.
Task 4: Conclude with your opinion.


Article name
2016 Grover and S., Sharma, “Security issues in wireless sensor network—a review,” In 2016 5th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions)(ICRITO), vol. 12, no. 6, pp. 397-404, 2016.

Summary of article
The chosen paper is based on the networking and communication system that was written by Jitender and Shikha in the year 2016. The aim of the paper is to evaluate and describe the security risks and threats occurred in the wireless sensor network [1]. According to the writers, wireless sensor network (WSNs) are defined as the collectors of data from the physical world and helpful for exchanging data from one network to another easily. This paper mainly focused on the security issues in the WSNs where the writers highlighted the security risks and attacks linked with the computing networks and their impacts on the personal data.

It is highlighted that WSNs are now used by the business communities for enhancing the performance of the communication systems and transferring data without using connecting cables or wires. The writers reported that the security of the wireless network is a challenging task for the companies where the hackers transfer the malware codes and signals which are not able to detect and manage by the companies [2]. This paper provided a way to review numerous kinds of security threats that can be faced by companies while using wireless sensor network in the communication systems. The writers highlighted that wireless networks are capable to manage the security risks effectively due to which the hackers can easily perform data breach activities and gather all reliable data in less time. While using WSNs, companies need to be focused on data confidentiality, data integrity, data availability, and authenticity.

In this paper, the writers divided security threats into major three categories including based on routing, based on capability and based on the protocol layer. Based on the routing numerous kinds of attacks occurred in the wireless networks including wormhole attack, HELLO flood attack, selective forwarding attack, Sybil attack and so on [3]. All these attacks and risks are evaluated in the paper and also supported the findings of previous articles and papers. Based on the capability, major three kinds of attacks can occur in the WSNs including insider or outsider attack, active or passive attack and laptop class or mote class attack. In the protocol layer, the cyber-crimes occur in the physical layer, network layer and link layer where the hackers send the larger traffic signals and reduce the confidentiality of servers and produce hacking issues [4].

Moreover, the writers evaluated and reviewed the numerous security protocols utilized in the WSNs including SPINs, LEAP, ZIGBEE and many more. The researchers reported that ZIGBEE is a common wireless communication protocol used by companies to implement effective networks that can help to perform data transmission [5]. This paper provided depth information and included the viewpoints of other writers that helped to enhance research quality and manage research gaps effectively. There are three sections included in the paper such as security requirements, classifications of attacks, and communication protocols used in the wireless sensor network where the researchers provided in-depth analysis.

Evaluation of research methods
Research design
It is a significant chapter of the methodology that delivers a way to develop and implement effective plans in the research. In this paper qualitative design is adopted by the investigators because of the subjective nature of the topic. Such kind of design helped to obtain effective information about wireless sensor network and addressed the research gaps that happened in recent studies. Using a qualitative design, the writers adopted subjective information in the research and evaluated the security risks associated with the WSNs.

Research approach
It is found that two kinds of approaches could be implemented in the studies including inductive and deductive. In the chosen paper, an inductive approach is adopted due to their ability to manage research gaps and provide depth information in the investigation. The presence of an inductive approach helped the writers to describe effective data gathering processes and managed the flow of information in the entire article. So, it is highlighted that the inductive approach supported the qualitative design and helped to achieve research objectives with better outcomes.

Data collection techniques
It is a key section of the methodology that has the ability to complete the research within the desired time period. Mainly data gathering method is divided into two parts including primary and secondary methods. In this article, secondary methods are adopted by the investigators due to the theoretical behavior of the research topic. The researchers added a literature review that helped to gather secondary data about WSNs security attacks and crimes. For obtaining data major three resources are included such as peer-reviewed papers, online websites, and books related to the wireless sensor network. Using such methodology, the writers adopted effective points in the investigation and managed the research concerns effectively that supported to conclude effective points in the research.

Data analysis
For analyzing the obtained information, a descriptive content analysis technique is used by the writers that helped to obtain reliable results and findings. The presence of such methodology managed the flow of information and provided a way to analyze the secondary data gathered from the literature review. The writers stated effective results in the research due to the involvement of the descriptive content analysis approach. Therefore, it is highlighted that using such research methods the writers completed the research with better outcomes and also addressed the included questions in regards to the WSNs security attacks. However, the investigators included theoretical information in the article that may affect the quality of investigation but overall the adopted methods helped to complete investigation with better conclusions.

Findings of the paper
From the chosen paper, it is found that security is a major problem faced by companies while using wireless sensor networks\ due to which the private data can be hacked by the criminals. It is highlighted that most of the attacks occur due to insider threats and vulnerabilities where the criminal's transfer malware signals and employees access such networks that reduce the security of data. This paper shows the security concerns linked with the wireless sensor network and determined that major three risk factors that lead such issues in the companies including lack of privacy, presence of malware signals and unauthorized access. This paper determined that most of the criminals use malicious codes for developing traffic and unauthorized access by which the communication channels linked with the wireless networks can be hacked easily.

It is demonstrated that security and privacy in the WSNs have various difficulties including dynamically changing topology, limited physical resources like energy resources and many more. It is significant for companies to enhance the confidentiality and integrity of the WSNs in order to protect data from the criminals and enhance the effectiveness of wireless networks and computing devices. The researchers examined that cryptography is an effective technique that may be adopted by the companies to secure data from the hackers and manage the cyber-crimes effectively. In which the transmitted signals are converted into the ciphertexts which are able to protect original information from the unauthorized activities and significantly transfer the information from one source to another. Therefore, in terms of effectiveness, cryptography is more effective that can be adopted by the companies along with the communication protocols in wireless sensor network for protecting data from hackers and enhancing the privacy of sensitive data.

According to my opinion, the chosen paper provided depth information about security threats linked with the WSNs and evaluated their impacts on personal information. The researchers included theoretical information that produced research gaps and affected the quality of investigation. The major benefit of the paper is that the investigators provided a way to evaluate security attacks linked to the wireless sensor network.

However, the writers did not provide effective mitigation techniques and tools that produced problems in the research and also increased research gaps. In terms of effectiveness, the adopted research methods are more effective and appropriate by which the developed research concerns are addressed effectively and obtain appropriate findings in the investigations. It is found that the writers highlighted cryptography which is an effective technique by which the security of WSNs can be increased effectively. The presence of such a process can help the companies to convert signals into cipher codes using private keys and cannot be detected by the hackers by which the security of sensitive data can be enhanced by the companies.

This paper provided a way to enhance skills in regards to the security concerns linked to the wireless sensor network and adopted effective research methods that supported to complete the research with better outcomes. So, the future research will describe effective mitigation techniques for addressing the cyber-crimes highlighted in the paper and will conduct a survey through questionnaire for gathering fresh information about WSNs security concerns and its countermeasures. Overall, the selected paper provided complete information about security attacks and also managed the research gaps by providing depth analysis about WSNs. However, it is suggested that companies should develop effective security plans and policies and adopt cryptography-based systems in WSNs for protecting communication channels and data from hackers. 


  • Grover and S., Sharma, “Security issues in wireless sensor network—a review,” In 2016 5th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions)(ICRITO), vol. 12, no. 6, pp. 397-404, 2016.
  • , Burg, A. Chattopadhyay and, K.Y., Lam, “Wireless communication and security issues for cyber–physical systems and the Internet-of-Things,” Proceedings of the IEEE, vol. 106, no. 1, pp.38-60, 2017.
  • Rani and, S., Kumar, “A survey of security in wireless sensor networks,” In 2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT), vol. 12, no. 6, pp. 1-5, 2017.
  • B. Hari and, S.N., Singh, “Security issues in Wireless Sensor Networks: Current research and challenges,” In 2016 International Conference on Advances in Computing, Communication, & Automation (ICACCA)(Spring), vol. 10, no. 6, pp. 1-6, 2016.
  • , Garcia-Troyano, G. Gomez and, F.J., Lopez-Martinez, “Physical layer security of wireless communication systems affected by LOS blockage,” In 2018 IEEE Wireless Communications and Networking Conference (WCNC), vol. 12, no. 6, pp. 1-5, 2018.

Related Samples

Question Bank

Looking for Your Assignment?

Search Assignment
Plagiarism free Assignment









9/1 Pacific Highway, North Sydney, NSW, 2060
1 Vista Montana, San Jose, CA, 95134