2011 Third International Conference on Computational Intelligence, Modelling &Amp; Simulation 2011
DOI: 10.1109/cimsim.2011.62
|View full text |Cite
|
Sign up to set email alerts
|

Overview of Security Issues in Wireless Sensor Networks

Abstract: Wireless sensor networks (WSN) are generally set up for gathering records from insecure environment. Nearly all security protocols for WSN believe that the opponent can achieve entirely control over a sensor node by way of direct physical access. The appearance of sensor networks as one of the main technology in the future has posed various challenges to researchers. Wireless sensor networks are composed of large number of tiny sensor nodes, running separately, and in various cases, with none access to renewab… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
55
0

Year Published

2012
2012
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 115 publications
(55 citation statements)
references
References 14 publications
0
55
0
Order By: Relevance
“…It is (Xiaowang and Jianyong, 2011) proposed an automatic tuning IDS (ATIDS). By this the system will automatically tune the detection model on-the-fly according to the feedback provided by the system operator when false predictions are encountered (Modares et al, 2011).…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…It is (Xiaowang and Jianyong, 2011) proposed an automatic tuning IDS (ATIDS). By this the system will automatically tune the detection model on-the-fly according to the feedback provided by the system operator when false predictions are encountered (Modares et al, 2011).…”
Section: Methodsmentioning
confidence: 99%
“…The SH scheme was initiated by (Modares et al, 2011). In this model, a two-party SH is designed, by adapting the key agreement protocol, based on the bilinear Diffie-Hellman assumption.…”
Section: Jcsmentioning
confidence: 99%
“…Caused by resource restriction some of WSN applications work without security which decreased Quality of Service (QoS). [8] In order to achieve security and privacy in Wireless Sensor Networks (WSNs), it is necessary to implement and deploy a certain number of mechanisms. Due to the sensitivity of sensor data in many applications the mechanisms for attack detection, prevention of data corruption and vulnerability assessment play an important role.…”
Section: Security In Wsnmentioning
confidence: 99%
“…Recently, in the security field of wireless network, a great deal of research [6][7][8] has been carried out commonly using cryptography, authentication, and hash functions to improve the security of network. Undoubtedly, the present achievements have greatly promoted related research in improving security of network, especially the confidentially, integrity, authentication, availability, and no-repudiation of data in the network.…”
Section: Introductionmentioning
confidence: 99%