Content area
Full text
Academic Editor:Lisimachos Kondi
Graduate School of Natural and Applied Sciences, Gazi University, Besevler, 06500 Ankara, Turkey
Received 15 May 2014; Revised 30 September 2014; Accepted 1 October 2014; 23 October 2014
This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
1. Introduction
Developments in low-cost sensor architectures have made wireless sensor networks (WSNs) a new and known research area [1]. These networks consist of large number of low-power and low-cost sensors with limited capacity, short-range transmitters spatially distributed in an often inaccessible and unreliable environment [2]. Each node has the abilities of calculation, detection, and communication [3]. These nodes that can be randomly distributed in the environment to be observed can recognize each other and can perform the task of measuring in a wide area by working together. Because of these properties, they can be used in a wide range of areas from health care to military, building security to detection of forest fires [4]. The WSN is facing a wide variety of security vulnerabilities due to the hardware limitations of the sensor nodes, wireless communication environment, real-time processing needs, heterogenic structure, large number of nodes, need for measurability, mobility, the weight of the application environmental conditions, and cost [5]. Confidentiality which is the basic goal of security provides one of the most important obstacles to overcome in order to ensure the integrity and availability as well as the achievement of time-critical and vital goals [6]. During sensitive WSN applications, such as the surveillance of enemy or borderlines, the security protocols which enable the sensors to transfer secret data to the base station must be used. However, the low processor and radio capacities of the sensors prevent traditional security protocols from being used in WSN applications [7]. Nowadays, various security protocols that consider these aspects of WSNs and their nodes are being developed. The security protocols to be developed should implement all the security issues (data confidentiality, data integrity, data freshness, data authentication, and availability) [8] but also provide high security with low energy consumption. Moreover, the fact that most of the suggested solutions are just based on the simulation platform and that solutions...