2011
DOI: 10.1016/j.procs.2011.07.017
|View full text |Cite
|
Sign up to set email alerts
|

A Secure Platform of Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 24 publications
0
7
0
Order By: Relevance
“…Since data transmission in WSN is via a wireless mode, almost all the data is open and the entire system is vulnerable for attacks. There are various security parameters such as confidentiality, integrity, availability and authenticity which must be considered in any type of network environment [3,4]. These are some of the issues to be handled with respect to WSN.…”
Section: Security Requirements For Wsn'smentioning
confidence: 99%
See 2 more Smart Citations
“…Since data transmission in WSN is via a wireless mode, almost all the data is open and the entire system is vulnerable for attacks. There are various security parameters such as confidentiality, integrity, availability and authenticity which must be considered in any type of network environment [3,4]. These are some of the issues to be handled with respect to WSN.…”
Section: Security Requirements For Wsn'smentioning
confidence: 99%
“…It protects against unwanted information to be a part of data, such as noise. 4. Availability-Availability assures that the resources accessible by the network are available for the nodes whenever required.…”
Section: Security Requirements For Wsn'smentioning
confidence: 99%
See 1 more Smart Citation
“…This unit outputs plaintext (x, y). For example : the cipher text is Cm= (0336, 0336), the key for decryption Kdec is 6ad, the plaintext obtained is p(ode,ode) which is calculated using Equation (8). The above procedure is repeated for 112, 131, 163 bits.…”
Section: B Encryption Unitmentioning
confidence: 99%
“…Abidalrahman et al, [8] scrutinizes the security problems in WSNs scenario and checks the existing techniques to implement the cryptographic approaches used to provide security services for WSNs. Further, they have proposed a customized hardware platform to f x holes for Wireless Sensor Networks.…”
Section: Introductionmentioning
confidence: 99%