IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing - Vol 2 - Workshops
DOI: 10.1109/sutc.2006.120
|View full text |Cite
|
Sign up to set email alerts
|

Securing Distributed Wireless Sensor Networks: Issues and Guidelines

Abstract: We

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(8 citation statements)
references
References 36 publications
0
8
0
Order By: Relevance
“…Authentication of WSN nodes is an often quoted security challenge [36,37,38]. The exploration of Attribute Certificates [39] and/or Kerberos tickets may enable novel secure authentication methods.…”
Section: Resultsmentioning
confidence: 99%
“…Authentication of WSN nodes is an often quoted security challenge [36,37,38]. The exploration of Attribute Certificates [39] and/or Kerberos tickets may enable novel secure authentication methods.…”
Section: Resultsmentioning
confidence: 99%
“…To improve the performance of IoT healthcare networks with respect to security, longevity, and connectivity under varying environmental conditions, security should be ensured at each layer of the protocol stack. The interested reader is referred to [172] and [173] for a better understanding of layer-wise issues.…”
Section: ) Attacks Based On Network Propertiesmentioning
confidence: 99%
“…All of them need to solve the confidentiality, integrity, authentication of messages and access control, etc. [5,6]. The differences between sensor networks and ad hoc network are as the following [1,7]:…”
Section: Introductionmentioning
confidence: 99%