2020
DOI: 10.1109/access.2020.2977778
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Security Requirements for WSNs: Focusing on the Characteristics Related to Security

Abstract: As WSNs combine with a diversity of next-generation technologies, wireless sensor networks (WSNs) have gained considerable attention as a promising ubiquitous technology. Even though several studies on WSNs are being undertaken, few systematically analyze the security issues relating to them. Moreover, recent systems tend to be implemented without sufficient consideration about owns security requirements, which can lead to lethal threats. Systems that do not consider security requirements may provide attackers… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
27
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 52 publications
(27 citation statements)
references
References 68 publications
0
27
0
Order By: Relevance
“…Depending on the task in question, this technique can also be applied to different types of WSNs. In [67], Jin-Yong, Y.; Euijong, L. et al elaborated on wireless sensor network security requirements. They had their attention more on the characteristics of the establishment of security on the WSNs network.…”
Section: Related Workmentioning
confidence: 99%
“…Depending on the task in question, this technique can also be applied to different types of WSNs. In [67], Jin-Yong, Y.; Euijong, L. et al elaborated on wireless sensor network security requirements. They had their attention more on the characteristics of the establishment of security on the WSNs network.…”
Section: Related Workmentioning
confidence: 99%
“…The manufacturing sector consists of automotive industries, electronic industries, and pharmaceutical companies. Manufacturing sector is at high risk due to the intellectual property having high value [10]. Manufacturing industry has a high risk of cyber attack because their database consists of basic information of building a product.…”
Section: Manufacturing Sectormentioning
confidence: 99%
“…Security is critical in many monitoring applications. WSN has a large attack surface due to a variety of vulnerabilities [2] originated mainly by: a) nodes restricted energy and computational resources, which constrain their functionalities; b) deployment in hostile environments often at unknown positions and with difficult accessibility, which hinders node repair; c) unattended operation and remote network management that hamper physically checking the nodes' status, and simplify performing physical (or planning complex) attacks; d) high node exposure to disconnection, destruction, or modification; e) easy access to the wireless channel to eavesdrop or inject packets; f) use of an ad-hoc network infrastructure, where nodes trust each other; g) use of a network topology with frequent interchanges of routing information that might be false; h) unreliable communication, which hinders distinguishing between attacks and errors; and e) use of distributed algorithms involving many nodes, which are prone to internal attacks. A wide diversity of types of attacks take advantage of these vulnerabilities, see e.g., [2]- [4].…”
Section: Introductionmentioning
confidence: 99%