Wireless Sensor Networks 2008
DOI: 10.1002/9780470443521.ch12
|View full text |Cite
|
Sign up to set email alerts
|

Network Security and Attack Defense

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 40 publications
0
3
0
Order By: Relevance
“…The main method is used to give security from Eavesdropping of data is Encryption which uses the cryptography algorithms [6] which is divided in two parts symmetric and second is asymmetric. There are so many methods or algorithms used today for encrypting or decrypting the data through which data/information is arranged systematically, and even through which data is encrypted one by one at sender side and same process of decryption of the data is also revised by same public key and different private key at receiver side.…”
Section: Securitymentioning
confidence: 99%
“…The main method is used to give security from Eavesdropping of data is Encryption which uses the cryptography algorithms [6] which is divided in two parts symmetric and second is asymmetric. There are so many methods or algorithms used today for encrypting or decrypting the data through which data/information is arranged systematically, and even through which data is encrypted one by one at sender side and same process of decryption of the data is also revised by same public key and different private key at receiver side.…”
Section: Securitymentioning
confidence: 99%
“…• The lifetime of WSN is the total amount of time before the first sensor node runs out of the power [6]. Equations ( 2) and (3) of energy consumption are adopted to calculate the transmission cost E Tx (l, d) and the receiving cost E Rx (l) of k-bit message between two nodes where their distance is d. Then the energy expenditure for transmitting L-bit message to distance is:…”
Section: Literature Survey and Related Workmentioning
confidence: 99%
“…Nonetheless, the computational, energy, and memory constraints imposed on sensor nodes and the attack environment in which they operate make them more vulnerable, as these conditions prohibit the use of more secure public-key cryptography [12,13]. Therefore, security protocols for protecting 5G connected UAV sensor networks from malicious attacks are urgently needed [14]. To achieve secure communication, key pre-distribution has become an acceptable technique, which allows sensor nodes to dynamically establish peer-to-peer relationships [15,16].…”
Section: Introductionmentioning
confidence: 99%