2014
DOI: 10.1155/2014/393248
|View full text |Cite
|
Sign up to set email alerts
|

Securing Cognitive Wireless Sensor Networks: A Survey

Abstract: Wireless sensor networks (WSNs) have gained a lot of attention recently due to the potential they provide for developing a plethora of cost-efficient applications. Although research on WSNs has been performed for more than a decade, only recently has the explosion of their potential applicability been identified. However, due to the fact that the wireless spectrum becomes congested in the unlicensed bands, there is a need for a next generation of WSNs, utilizing the advantages of cognitive radio (CR) technolog… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
6
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 18 publications
(10 citation statements)
references
References 85 publications
0
10
0
Order By: Relevance
“…Thus, a message, sent by this node, circulates in a hidden way in the network until it reaches the target. () However, this mechanism cannot be adopted by all the networks such as the cognitive wireless sensor network due to the low power, memory, and computation time constraints.…”
Section: Crns Attacks and Vulnerabilitiesmentioning
confidence: 99%
“…Thus, a message, sent by this node, circulates in a hidden way in the network until it reaches the target. () However, this mechanism cannot be adopted by all the networks such as the cognitive wireless sensor network due to the low power, memory, and computation time constraints.…”
Section: Crns Attacks and Vulnerabilitiesmentioning
confidence: 99%
“…Sensor nodes are mostly battery powered and energy constrained. In addition, the limited computational capability and memory of sensor nodes, along with its energy-constrained nature, means that there is a high probability of node failure [41,42]. Thus, even though the sensor nodes are mostly stationary, the topology of WSNs can be dynamic due to node failure.…”
Section: Wireless Mesh Network Wireless Mesh Network (Wmn)mentioning
confidence: 99%
“…The security is proved and the implemented algorithm resists against a brute force attack. We remind that some new research works focus on network sensor security and use encryption algorithms to improve the security of data and energy consumption [16][17][18]; in this context, we aim to implement our CA cryptosystem as a lightweight security protocol. …”
Section: B Performance Testmentioning
confidence: 99%