2021
DOI: 10.1007/978-981-16-4884-7_8
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of the Cybersecurity in Wireless Sensor Networks (WSN): A Review Literature

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 38 publications
0
3
0
Order By: Relevance
“…As WSN distributes the data from various sender nodes via multi-path-routing procedures, the need for sender-originated IHFs is generated for the original frame sequence. In this process, each IHF holds a random number of fake data and other lookalike network credentials to thwart the attackers [ 47 , 48 ].…”
Section: Methodsmentioning
confidence: 99%
“…As WSN distributes the data from various sender nodes via multi-path-routing procedures, the need for sender-originated IHFs is generated for the original frame sequence. In this process, each IHF holds a random number of fake data and other lookalike network credentials to thwart the attackers [ 47 , 48 ].…”
Section: Methodsmentioning
confidence: 99%
“…In addition, it discusses reputation and trust in WSNs, its history, significance, concept, and characteristics. The aim of the work in [61] is to analyze cybersecurity and identify the threats generated by WSNs, as well as the encryption algorithms incorporated into WSNs for data security.…”
Section: Securitymentioning
confidence: 99%
“…Wireless sensor networks are typically deployed in unscreened environments and as vital components; they employ in numerous sectors such as the economy, health department, banking, intelligence sector, etc. [4]. Therefore, flaws in cyber security profoundly impact these sectors.…”
Section: Introductionmentioning
confidence: 99%