2022 9th International Conference on Computing for Sustainable Global Development (INDIACom) 2022
DOI: 10.23919/indiacom54597.2022.9763130
|View full text |Cite
|
Sign up to set email alerts
|

Security in Wireless Sensor Network: A Current Look

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 10 publications
0
3
0
Order By: Relevance
“…WSN middleware exists in many aspects of computer science, including artificial intelligence, computer systems and networks, security, database systems, human–computer interaction, vision and graphics, numerical analysis, programming languages, software engineering, bioinformatics, and the theory of computing [ 39 ]. WSNs are also employed in applications related to urban [ 40 ] and rural [ 41 ] projects, outdoor [ 42 ] and indoor [ 34 , 43 ] tracking, environmental monitoring [ 44 ], disaster monitoring [ 45 ], water quality [ 46 ], habitat monitoring [ 47 ], traffic monitoring [ 48 ], earthquake detection [ 49 ], volcano eruption [ 50 ], agriculture [ 51 ], weather forecasting [ 52 ], smart water management [ 53 ], smart cities [ 54 ], smart health [ 55 ], smart energy management [ 56 ], smart traffic management [ 57 ], smart retail [ 58 ], smart security [ 59 ], smart waste management [ 60 ], smart education [ 61 ], and smart homes [ 62 ].…”
Section: Related Workmentioning
confidence: 99%
“…WSN middleware exists in many aspects of computer science, including artificial intelligence, computer systems and networks, security, database systems, human–computer interaction, vision and graphics, numerical analysis, programming languages, software engineering, bioinformatics, and the theory of computing [ 39 ]. WSNs are also employed in applications related to urban [ 40 ] and rural [ 41 ] projects, outdoor [ 42 ] and indoor [ 34 , 43 ] tracking, environmental monitoring [ 44 ], disaster monitoring [ 45 ], water quality [ 46 ], habitat monitoring [ 47 ], traffic monitoring [ 48 ], earthquake detection [ 49 ], volcano eruption [ 50 ], agriculture [ 51 ], weather forecasting [ 52 ], smart water management [ 53 ], smart cities [ 54 ], smart health [ 55 ], smart energy management [ 56 ], smart traffic management [ 57 ], smart retail [ 58 ], smart security [ 59 ], smart waste management [ 60 ], smart education [ 61 ], and smart homes [ 62 ].…”
Section: Related Workmentioning
confidence: 99%
“…It outperforms the cluster head election methods by increasing network lifetime and lowering energy usage by 28% and 34%, respectively. In [21], a layer-by-layer taxonomy of security attacks is explored, as well as possible mitigation strategies were comprehended about the assaults and their severity. By analyzing the above literatures, some of the problems are identified.…”
Section: Related Workmentioning
confidence: 99%
“…Therefore, whether the information in question is delivered over the internet or kept in the cloud, maintaining the secrecy and preservation of data gathered by IoT devices is an important research problem that must be given priority 6 . Fog computing, which is more scalable than edge computing, has developed as a solution to these problems by handling the high processing demand and temporary storage 4,7,8 …”
Section: Introductionmentioning
confidence: 99%