Wireless Sensor Networks 2016
DOI: 10.1201/b13092-15
|View full text |Cite
|
Sign up to set email alerts
|

Security in Wireless Sensor Networks

Abstract: Wireless sensor networks (WSNs) have attracted a lot of interest over the last decade in wireless and mobile computing research community. Applications of WSNs are numerous and growing, which range from indoor deployment scenarios in the home and office to outdoor deployment in adversary's territory in a tactical battleground. However, due to distributed nature and their deployment in remote areas, these networks are vulnerable to numerous security threats that can adversely affect their performance. This prob… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
18
0
6

Year Published

2016
2016
2021
2021

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(24 citation statements)
references
References 108 publications
0
18
0
6
Order By: Relevance
“…One is that the dynamic object may be connected to unknown objects appearing in different environments. Therefore, according to [28], such object must be armed with different protection measures like an end-to-end security to secure its communications with other objects, tamper-proofing techniques to prevent physical attacks, side-channel analysis to prevent data leakage, and a secure firmware update method. While the static one may always be connected to trusted objects, and its security might be provided by the trusted objects.…”
Section: Sc6mentioning
confidence: 99%
See 1 more Smart Citation
“…One is that the dynamic object may be connected to unknown objects appearing in different environments. Therefore, according to [28], such object must be armed with different protection measures like an end-to-end security to secure its communications with other objects, tamper-proofing techniques to prevent physical attacks, side-channel analysis to prevent data leakage, and a secure firmware update method. While the static one may always be connected to trusted objects, and its security might be provided by the trusted objects.…”
Section: Sc6mentioning
confidence: 99%
“…The Importance of IoT objects Security of an IoT object depends on its importance. For instance, in a WSN, a sink node requires more defensive techniques when compared to sensor nodes, since the sink node is responsible for collecting, aggregating and processing data coming from sensor nodes as well as managing the whole network [28]. To this point, the authors in [29] have stated that the malicious nodes in WSN that persistently emit unwanted signals towards the sink node or a base station could stop or paralyze the whole network.…”
Section: Sc7mentioning
confidence: 99%
“…Untuk menangani serangan yang terjadi, saat ini telah terdapat beberapa mekanisme deteksi dan penanggulangan misalnya melakukan otentikasi, pengecekan redudancy, packet leashes dengan menggunakan info geografi secara temporal, predistribusi kunci, deteksi menggunakan informasi keberadaan tetangga, mengawasi alur multidata, kalkulasi one hop, dan sebagainya [7]. Dari masing-masing mekanisme masih memiliki kelemahan seperti protokol routing yang digunakan tidak menerapkan desain teknik single path, efisiensi energi sangat kecil, adanya redudancy data yang dikirimkan, dan tidak adanya pendeteksi jika sensor node telah mengalami modifikasi dari penyerang [8].…”
Section: Pendahuluanunclassified
“…Saat node yang dituju mempunyai informasi rute menuju node tujuan menerima paket RREQ, maka nilai destination sequence number yang ada pada RREQ akan dibandingkan. Apabila nilai sequence number pada RREQ lebih besar dari nilai yang ada pada node yang menerima, maka paket RREQ akan diteruskan lagi ke node sekitarnya[19].Serangan wormhole merupakan jenis serangan pada wireless sensor network dimana penyerang mencatat paket pada satu lokasi di jaringan dan memindahkannya dengan membuat terowongan ke lokasi lain[8]. Terowongan ini memberikan ilusi seolah-olah path tersebut adalah path terpendek menuju node tujuan.…”
unclassified
“…Due to their wide range of applications, they have already become so attractive to research community. However, WSNs are characterized by low communication bandwidth and power consumption constraints [1]. Thus, network coding (NC) can be a promising solution for WSNs, since it is a technique that can provide network capacity improvement [2] and lower energy consumption [3].…”
Section: Introductionmentioning
confidence: 99%