2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA) 2015
DOI: 10.1109/cybersa.2015.7166112
|View full text |Cite
|
Sign up to set email alerts
|

Security management in Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
7
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
3
2
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(7 citation statements)
references
References 7 publications
0
7
0
Order By: Relevance
“…When a fake node attracts the network traffic, an attack is generated. Once the attack is successful, the forged node can perform various malfunctions like dropping all packets, dropping selective packets and alteration of data [32,33].…”
Section: Sink Hole Attackmentioning
confidence: 99%
See 1 more Smart Citation
“…When a fake node attracts the network traffic, an attack is generated. Once the attack is successful, the forged node can perform various malfunctions like dropping all packets, dropping selective packets and alteration of data [32,33].…”
Section: Sink Hole Attackmentioning
confidence: 99%
“…In wireless sensor network, all the sensor nodes work complaisantly but this type of attack targets this cooperation and disturb the routing and communication process [31][32][33].…”
Section: Sybil Attackmentioning
confidence: 99%
“…Due to the inherent limitations of sensor networks, commonly used security mechanisms like key management [4], authentication [5], cryptography [6], etc are hard to implement in these networks. For this very reason, security becomes a crucial issue and these networks face a wide variety of attacks such as denial of service (DoS) attack, wormhole attack, black hole attack, routing table overflow and poisoning attack, packet replication attack, gray hole attack and modification of packets attack etc.…”
Section: Introductionmentioning
confidence: 99%
“…The protection and privacy of WSN must be treated carefully for smart grid applications which is a broad network comprising of enormous networks and protocols. The public and private security measures for WSN in various smart grid applications require costly solutions [67][68][69]. The cost-security tradeoff must be carefully implemented.…”
mentioning
confidence: 99%
“…They are deployed either in fixed manner or in random manner. They are remotely managed and controlled [66][67][68][69].  Communication Constraints: WSNs communicate using radio transmissions and most of them use unlicensed ISM band which is used for many other applications.…”
mentioning
confidence: 99%