2020
DOI: 10.3390/s20030744
|View full text |Cite
|
Sign up to set email alerts
|

Security and Privacy in Wireless Sensor Networks: Advances and Challenges

Abstract: Wireless sensor networks (WSNs) have evolved over the last few decades due to the availability of low-cost, short-range and easy deployed sensors [...]

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 33 publications
(25 citation statements)
references
References 12 publications
0
21
0
Order By: Relevance
“…To reduce the security requirements, the data must be compromised. Consequently, a suitable solution to use robust and lightweight security algorithms leads to propose different encryption technologies [91].…”
Section: Perception Layer's Limitationsmentioning
confidence: 99%
“…To reduce the security requirements, the data must be compromised. Consequently, a suitable solution to use robust and lightweight security algorithms leads to propose different encryption technologies [91].…”
Section: Perception Layer's Limitationsmentioning
confidence: 99%
“…There have been nearly 40 years of research on distributed sensor detection networks [16], and the research on distributed detection-based massive MIMO networks has been studied in [17,18]. Typical applications include spectrum sensing in cognitive radio networks (CRNs) [19] and event detection in wireless sensor networks (WSNs) [20,21]. With the rapid development of massive MIMO technology, the use of multi-antenna sensors should be more considered in a distributed detection network.…”
Section: Related Workmentioning
confidence: 99%
“…The system has a limited upper limit of detection performance when the number of antennas is large, and depends on the signal variance σ 2 θ , the variance of the receiver noise in the sensor σ 2 v,ik and the number of sensors N. It can be seen that the prerequisite for reaching the upper limit of the detection performance is the infinite M and P, at which time the distribution of the perceived report power becomes unimportant. However, for the actual system, the values of M and P cannot be infinite, so optimizing g 2 ik will bring significant benefits to the performance of Equation (21). To reduce the complexity of subsequent formula derivation, we use new symbols to define…”
Section: Detection Performance Analysismentioning
confidence: 99%
“…One of these issues applies to security, privacy, and availability within the perception layer [ 4 ]. Attackers can listen in on radio transmissions, send fake messages over communication channels, and alter received data packets [ 5 , 6 ]. Moreover, they can use compromised WSN nodes with similar hardware resources to legitimate network nodes [ 7 ].…”
Section: Introductionmentioning
confidence: 99%