GLOBECOM 2017 - 2017 IEEE Global Communications Conference 2017
DOI: 10.1109/glocom.2017.8254520
|View full text |Cite
|
Sign up to set email alerts
|

A Quantitative Model for Dynamic Security Analysis of Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 13 publications
0
2
0
Order By: Relevance
“…Reset Sequence Attacks [64], [65] Limiting device access, device monitoring, and access control. Node Capture Attacks [66]- [73] Limiting device access, device monitoring, access control, and loss prevention practices [74]. Side and Sensory Channels EM Attacks [75]- [79] Best installation practices, directional antennas [80].…”
Section: E-iot Devices Layer: Attacks and Vulnerabilitiesmentioning
confidence: 99%
See 1 more Smart Citation
“…Reset Sequence Attacks [64], [65] Limiting device access, device monitoring, and access control. Node Capture Attacks [66]- [73] Limiting device access, device monitoring, access control, and loss prevention practices [74]. Side and Sensory Channels EM Attacks [75]- [79] Best installation practices, directional antennas [80].…”
Section: E-iot Devices Layer: Attacks and Vulnerabilitiesmentioning
confidence: 99%
“…As such, the attacks could acquire communication keys, eavesdrop on messages, impersonate devices, track user activity, and impersonate users. Several other pieces of literature have discussed node capture attacks that exploit vulnerabilities to gather keys from connected devices [68]- [73]. The work of Lin et al focused more on the efficiency of node capture attacks and introduced the full graph attack (FGA), with two optimal algorithms for this attack [111].…”
Section: E-iot Devices Layer: Attacks and Vulnerabilitiesmentioning
confidence: 99%