2018
DOI: 10.1007/978-3-319-75880-0_4
|View full text |Cite
|
Sign up to set email alerts
|

WSN Security Mechanisms for CPS

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(9 citation statements)
references
References 46 publications
0
9
0
Order By: Relevance
“…• Network Layer: W.r.t. security, this is the most vulnerable layer in a CPS because of the vast possibilities of attacks on communication networks which emerged over the years [63][64][65][66].…”
Section: Security Threats In Cpsmentioning
confidence: 99%
“…• Network Layer: W.r.t. security, this is the most vulnerable layer in a CPS because of the vast possibilities of attacks on communication networks which emerged over the years [63][64][65][66].…”
Section: Security Threats In Cpsmentioning
confidence: 99%
“…Device tampering attacks also result in selective message eavesdropping attacks which acts as a base for launching other serious security attacks such as wormhole, black-hole attacks. The device tempering attacks can be avoided using various tempering proof techniques [58]- [60] proposed in the literature however require additional energy and processing costs.…”
Section: B Secure the Communication Channelmentioning
confidence: 99%
“…The collection of multiple sensors in the WSN works in synchronization to integrate and perform the task of sensing the data. The data thus collected contain much deeper insights that were not possible with individual sensing capabilities [51,52]. Furthermore, optimal dynamic network topologies can be adopted to place the sensors at appropriate positions within the CPS ecosystem to cater to the needs of changing subjects and their surroundings.…”
Section: • Sensors and Sensing Modulementioning
confidence: 99%
“…Since all the data are available in digital form and stored on the cloud (mostly), its privacy and security are always questionable when a third party is involved. Several approaches have been proposed in the recent literature to mitigate the security issues in CPS within smart cities [52,60,119,122,124,129,[131][132][133][134][135][136][137][138][139][140][141][142][143].…”
Section: Privacy and Securitymentioning
confidence: 99%