2009 Third International Conference on Sensor Technologies and Applications 2009
DOI: 10.1109/sensorcomm.2009.74
|View full text |Cite
|
Sign up to set email alerts
|

SecSens - Security Architecture for Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2010
2010
2019
2019

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(4 citation statements)
references
References 8 publications
0
4
0
Order By: Relevance
“…WiFi signals include a "preamble" which is used by the receiver to determine channel state. One approach that can be used to detect tampering is to monitor channel state variation (Bagci, 2016).…”
Section: Wireless Tamperingmentioning
confidence: 99%
“…WiFi signals include a "preamble" which is used by the receiver to determine channel state. One approach that can be used to detect tampering is to monitor channel state variation (Bagci, 2016).…”
Section: Wireless Tamperingmentioning
confidence: 99%
“…Cryptographic protocols and infrastructures have been developed for securing communication in sensor networks [2]. However, neither can extend the trust perimeter to include the sensing element itself.…”
Section: A Related Workmentioning
confidence: 99%
“…Recently, phishers have also begun to use images to evade detection by text-based anti-phishing filters. While certified cryptographic protocols and infrastructures have been developed for securing the communication channels [4], they cannot prevent false pretenses from masquerading as trustworthy imaging devices in the electronic communications. This security hole can be closed up by integrating dedicated security functions into the image sensor [5].…”
Section: Introductionmentioning
confidence: 99%