2013 International Conference on Intelligent Systems and Signal Processing (ISSP) 2013
DOI: 10.1109/issp.2013.6526929
|View full text |Cite
|
Sign up to set email alerts
|

Security attacks in wireless sensor networks: A survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
28
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 52 publications
(28 citation statements)
references
References 19 publications
0
28
0
Order By: Relevance
“…This paper examines one of the most important axes of Wireless Sensor Networks, which is security [21] and particularly Intrusion Detection Systems (IDS) [14]. As already stated, IDSs are defined as the second lines of defense; yet, key management and authentication represent just a first line of defense against just external attacks.…”
Section: A Background Of Idss Security In Wsnsmentioning
confidence: 99%
“…This paper examines one of the most important axes of Wireless Sensor Networks, which is security [21] and particularly Intrusion Detection Systems (IDS) [14]. As already stated, IDSs are defined as the second lines of defense; yet, key management and authentication represent just a first line of defense against just external attacks.…”
Section: A Background Of Idss Security In Wsnsmentioning
confidence: 99%
“…The Sybil attack is defined as a malicious device that assumes numerous identities [42]. Malicious nodes can allege to have many identities.…”
Section: Sybil Attackmentioning
confidence: 99%
“…We implemented the SPD on the Wireless Open-Access Research Platform (WARP) platform [3] and Fig. 2 illustrates the work flow of the SPD process of our implementation.…”
Section: Spd Modelmentioning
confidence: 99%
“…The OFDM reference design employed a simplified Carrier-Sense Medium Access (CSMA) protocol which encompasses much of the behaviour of the commercial IEEE 802.11 MAC/PHY chipsets. This algorithm lends itself nicely to a state diagram which can be run on the MicroBlaze of the WARP FPGA; the source code for this is on the WARP website [3].…”
Section: Prototyping and Experiments Setupmentioning
confidence: 99%