Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
23
0

Year Published

2013
2013
2017
2017

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 40 publications
(23 citation statements)
references
References 23 publications
0
23
0
Order By: Relevance
“…Such a feature can be promoted by an appropriate security policy that will guide sensors to react based on different conditions. With regards to security policies in WSNs, designs have mostly focused on prevention aspects [14][15][16][17].…”
Section: Related Workmentioning
confidence: 99%
“…Such a feature can be promoted by an appropriate security policy that will guide sensors to react based on different conditions. With regards to security policies in WSNs, designs have mostly focused on prevention aspects [14][15][16][17].…”
Section: Related Workmentioning
confidence: 99%
“…However, sensors have too simple structure and limited resources to make complex security decisions on their own, instead relying on secure pairings and clever routing table algorithms to ensure messages are delivered safely. William R. Claycomb et al [5] presented a security policy for WSNs that enables sensor nodes to make critical security decisions about how they share information with others. Gaurav Haarmaa et al [26] reviewed and classified a variety of cryptographic techniques used in existing network system (see Fig.…”
Section: Security Concerns In Wsnmentioning
confidence: 99%
“…In particular, we simulate models of grid topology WSN including DoS (static and dynamic) detection policies. (3) We present formal models of the DoS detection mechanisms expressed in terms of generalized stochastic Petri nets (GSPN). In combination to GSPN models, we also present a number of performance and dependability properties formally expressed in terms of the Hybrid Automata Stochastic Logic (HASL) [25].…”
Section: Our Contributionmentioning
confidence: 99%
“…Other uses of WSNs include activities such as preventing chemical, biological, or nuclear threats in an area, or collecting data on a military field [2,3]. In such sensitive domains, the deployment of a WSN brings out strong requirements in terms of security.…”
Section: Introductionmentioning
confidence: 99%