2022 International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT) 2022
DOI: 10.1109/ismsit56059.2022.9932788
|View full text |Cite
|
Sign up to set email alerts
|

A comprehensive review of cybersecurity perspective for Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 18 publications
0
1
0
Order By: Relevance
“…This gives the crucial possibility of placing a network service to a secure network node according to cybersecurity requirements. By being based on a cybersecurity comprehensive study, it is shown that the CIA triad is the sufficient framework about cybersecurity at wireless networks, since it is proved that all other cybersecurity attributes used by the authors belong to the components of CIA triad such as confidentiality, integrity, and availability [8]. Furthermore, an interesting and motivated approach on service placement is that of using the state of the underlying community networks to optimize service deployment where a new placement heuristic based on bandwidth and availability is used to deploy the service [9].…”
Section: Introductionmentioning
confidence: 99%
“…This gives the crucial possibility of placing a network service to a secure network node according to cybersecurity requirements. By being based on a cybersecurity comprehensive study, it is shown that the CIA triad is the sufficient framework about cybersecurity at wireless networks, since it is proved that all other cybersecurity attributes used by the authors belong to the components of CIA triad such as confidentiality, integrity, and availability [8]. Furthermore, an interesting and motivated approach on service placement is that of using the state of the underlying community networks to optimize service deployment where a new placement heuristic based on bandwidth and availability is used to deploy the service [9].…”
Section: Introductionmentioning
confidence: 99%