2012
DOI: 10.1016/j.proeng.2012.07.215
|View full text |Cite
|
Sign up to set email alerts
|

A Review of Physical Attacks and Trusted Platforms in Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 18 publications
(6 citation statements)
references
References 24 publications
0
6
0
Order By: Relevance
“…Nia and Jha [92] have discussed the IoT security at three levels namely at the edge node level, communication level, and edge computing level and have emphasised the dangers of SCA attack at each level. While Roosta [96] discussed the importance of security in sensor networks, the authors of [97][98][99][100][101] have briefly surveyed on the different physical attacks that are possible in these networks thereby emphasising the possibility of SCA in sensor devices.…”
Section: Sca On Edge Nodesmentioning
confidence: 99%
“…Nia and Jha [92] have discussed the IoT security at three levels namely at the edge node level, communication level, and edge computing level and have emphasised the dangers of SCA attack at each level. While Roosta [96] discussed the importance of security in sensor networks, the authors of [97][98][99][100][101] have briefly surveyed on the different physical attacks that are possible in these networks thereby emphasising the possibility of SCA in sensor devices.…”
Section: Sca On Edge Nodesmentioning
confidence: 99%
“…Since sensor nodes are deployed over a large geographical area therefore they are more vulnerable to any of these attacks [6].…”
Section: F Denial Of Service (Dos) Attacksmentioning
confidence: 99%
“…They also provide interface with other sensor networks. The advantages of WSNs technologies are remarkable that provide in an expansive way to install a network and greatly contributed worldwide in WSNs applications [6]. The military application such as battlefield is an important example where WSNs are widely used.…”
Section: Introductionmentioning
confidence: 99%
“…In Ref. [36], the authors reviewed various types of physical attacks on WSNs and some trusted wireless sensor nodes. Their contributions show that further research on TPM-based attestation is essential to provide enough security for more challenging applications of WSNs.…”
Section: Remote Attestation Based On a Trusted Platform Modulementioning
confidence: 99%