Affiliation:
1. Department of Computer Engineering, Islamic Azad University, Science and Research Branch, Yazd, Iran
2. Department of Computer Engineering, Islamic Azad University, Maybod Branch, Maybod, Iran
Abstract
Wireless Sensor Networks (WSNs) have been recognized for their utility in a variety of different fields including military sensing and tracking, environmental monitoring, patient monitoring and tracking smart environments. The more scientists try to develop further cost and energy efficient computing devices and algorithms for WSNs, the more challenging it becomes to fit the security of WSNs into such a constrained environment. Thus, familiarity with the security aspects of WSNs is essential before designing WSN systems. In order to provide effective integrity, confidentiality, and authentication during communication, the need for additional security measures in WSNs emerges. In this paper, the authors review the security requirements for WSNs, the different kinds of possible attacks, and security mechanisms used to overcome these attacks. The authors also present some statistical data for such attacks in WSN and some tables that indicate a comparison between different security mechanisms.
Reference137 articles.
1. Wireless sensor networks: a survey
2. Albers, P., Camp, O., Percher, J. M., Jouga, B., Mé, L., & Puttini, R. (2002). Security in ad hoc networks: A general intrusion detection architecture enhancing trust based approaches. In Proceedings of the First International Workshop on Wireless Information Systems (WIS-2002).
3. Anderson, R., & Kuhn, M. (1996). Tamper resistance: A cautionary note. In Proceedings of the 2nd conference on USENIX Workshop on Electronic Commerce (Vol. 2).
4. Anderson, R., & Kuhn, M. (1998). Low cost attacks on tamper resistant devices. In B. Christianson, B. Crispo, M. Lomas & M. Roe (Eds.), Security Protocols (LNCS 1361, pp. 125-136).
5. Bala Krishna, M., & Doja, M. N. (2011, 7-9 Oct. 2011). Symmetric key management and distribution techniques in wireless ad hoc networks. In Proceedings of the International Conference on Computational Intelligence and Communication Networks (CICN).
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. IMMAESA;International Journal of Information Security and Privacy;2021-01