2012
DOI: 10.1186/1687-1499-2012-48
|View full text |Cite
|
Sign up to set email alerts
|

Security in cognitive wireless sensor networks. Challenges and open problems

Abstract: A cognitive wireless sensor network (CWSN) is an emerging technology with great potential to avoid traditional wireless problems such as reliability. One of the major challenges CWSNs face today is security. A CWSN is a special network which has many constraints compared to a traditional wireless network and many different features compared to a traditional wireless sensor network. While security challenges have been widely tackled in traditional networks, this is a novel area in CWSNs. This article discusses … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
25
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 57 publications
(25 citation statements)
references
References 30 publications
0
25
0
Order By: Relevance
“…Araujo et al [5] surveyed about the challenges and open problem in wireless sensor networks. They describe a wide variety of attacks, including communication attack, attack against privacy, node targeted attack, power consumption attack, policy attack and cryptography attack and different security measures available to handle these attacks.…”
Section: Related Workmentioning
confidence: 99%
“…Araujo et al [5] surveyed about the challenges and open problem in wireless sensor networks. They describe a wide variety of attacks, including communication attack, attack against privacy, node targeted attack, power consumption attack, policy attack and cryptography attack and different security measures available to handle these attacks.…”
Section: Related Workmentioning
confidence: 99%
“…The cooperative solution that is proposed by León, Hernández-Serrano, and Soriano [54], which specifically targets centralized IEEE 802.22 networks, is based on the same assumption and thus cannot cope with the emulation of PUs that have unknown locations (e.g., wireless microphones), despite its ability to precisely determine the locations of received signals. Blesa et al [55] state that countermeasures based on geo-location are not appropriate for scenarios with mobile PUs and SUs, and, according to Araujo et al [42], mobile attackers can take advantage of their mobility in order to remain undetected. We note that Peng, Zeng, and Zeng [56] propose what they argue to be the first PU emulation detection solution considering mobile attackers.…”
Section: Location-and Distance-based Approachesmentioning
confidence: 99%
“…This threat is materialized through the transmission of fake PU signals and does not necessarily require the attackers to participate in any underlying cooperative scheme. Thus, a PU emulation attacker does not aim at causing interference to PUs and, according to Araujo et al [42], PU emulation is the most studied attack against CR.…”
Section: Primary User Emulation In Cr Environmentsmentioning
confidence: 99%
“…Recently, in research works for WSN [8,13,14], more emphasis was given to WSN privacy issues. They discussed the method of various attacks and threats.…”
Section: Related Research Workmentioning
confidence: 99%