2017
DOI: 10.1007/s11277-017-4962-0
|View full text |Cite
|
Sign up to set email alerts
|

Recent Advances in Attacks, Technical Challenges, Vulnerabilities and Their Countermeasures in Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
64
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 151 publications
(64 citation statements)
references
References 115 publications
0
64
0
Order By: Relevance
“…Then, the potential security threats are detected in the paper at various protocol layers. Here, different security attacks are recognized along with their countermeasures assessed by various investigators recently [15].…”
Section: Related Workmentioning
confidence: 99%
“…Then, the potential security threats are detected in the paper at various protocol layers. Here, different security attacks are recognized along with their countermeasures assessed by various investigators recently [15].…”
Section: Related Workmentioning
confidence: 99%
“…In WSNs, the most severe threat is wormhole attacks [10] [11]. Generally, this type of attack is launched by two or more malicious nodes having a private channel, called a tunnel, between them.…”
Section: A Wormhole Attacksmentioning
confidence: 99%
“…With the advantages of low cost, large scale, densely distributed deployment and self-configuration [6], WSNs are widely used for industrial control, logistics management, environmental monitoring, military defense, and civilian life [7], [8], most of which support range of time and data sensitive applications and have high requirements for safety. However, as a consequence of distinctive open nature, limited resource availability, infrastructure less and self-governing nature, WSNs are very delicate to many attacks [9], [10].…”
Section: Introductionmentioning
confidence: 99%
“…• Fabrication These attacks are manifested by the injection of erroneous data into the WSN. Attacker aims to threaten message authenticity and network availability through the depletion of the energy resources of the network especially with wireless communications which are very energy intensive [32].…”
Section: • Modificationmentioning
confidence: 99%