2012 Second International Conference on Advanced Computing &Amp; Communication Technologies 2012
DOI: 10.1109/acct.2012.102
|View full text |Cite
|
Sign up to set email alerts
|

Security Solutions for Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
19
0
2

Year Published

2014
2014
2020
2020

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 32 publications
(21 citation statements)
references
References 12 publications
0
19
0
2
Order By: Relevance
“…The adversaries search for any data in networks; thus, to obscure hidden data hidden from users wishing to modify the data or illegal users, the data should be encrypted with a secret key [14], [15] to ensure protection from eavesdroppers.…”
Section: Data Confidentialitymentioning
confidence: 99%
See 4 more Smart Citations
“…The adversaries search for any data in networks; thus, to obscure hidden data hidden from users wishing to modify the data or illegal users, the data should be encrypted with a secret key [14], [15] to ensure protection from eavesdroppers.…”
Section: Data Confidentialitymentioning
confidence: 99%
“…Data authentication is the first prevention that stops any illegal user from participating in the network and original nodes must be distinguishable from unauthorized nodes [14]. Data in this stage should be confirmed for correctness.…”
Section: Data Authenticationmentioning
confidence: 99%
See 3 more Smart Citations