2006
DOI: 10.1109/comst.2006.315852
|View full text |Cite
|
Sign up to set email alerts
|

A survey of security issues in wireless sensor networks

Abstract: IEEE Communications Surveys & Tutorials • 2nd Quarter 2006 2dvances in wireless communication and electronics have enabled the development of low-cost, lowpower, multifunctional sensor nodes. These tiny sensor nodes, consisting of sensing, data processing, and communication components, make it possible to deploy Wireless Sensor Networks (WSNs), which represent a significant improvement over traditional wired sensor networks. WSNs can greatly simplify system design and operation, as the environment being monito… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
383
0
2

Year Published

2008
2008
2022
2022

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 682 publications
(410 citation statements)
references
References 86 publications
0
383
0
2
Order By: Relevance
“…According to the probability of key sharing between a pair of sensor nodes, the key distribution schemes can be classified into deterministic approaches [2,8] and probabilistic approaches [3,10]. An investigation of key distribution schemes for WSNs can be found in References [1,11]. In this paper, we focus on the key revocation problem.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…According to the probability of key sharing between a pair of sensor nodes, the key distribution schemes can be classified into deterministic approaches [2,8] and probabilistic approaches [3,10]. An investigation of key distribution schemes for WSNs can be found in References [1,11]. In this paper, we focus on the key revocation problem.…”
Section: Related Workmentioning
confidence: 99%
“…Once a sensor node is compromised, the attacker is capable of stealing the key materials contained within that node and starts various kinds of attacks [1]. Hence, the security of sensor nodes must be considered.…”
Section: Introductionmentioning
confidence: 99%
“…Secure routing is a prerequisite to such sensor applications. Wang et al [7] surveyed security issues and summarized the constraints, security requirements, and attacks with their corresponding countermeasures in sensor networks. Especially, this research pointed out the main network layer attacks against sensor networks: spoofed, altered, or replayed routing information, selective forwarding, sinkhole, sybil, wormholes, hello flood attacks, acknowledgment spoofing, etc.…”
Section: Related Workmentioning
confidence: 99%
“…Sensor nodes have low power requirements and frequently operate in adverse environments where packet errors may make security schemes difficult. In general, although sensor hardware may be capable of cryptography, these schemes rely on either a trusted third party or secure key management schemes (see [26,22]). Further, the exact network topology is hard to determine due to the large size and random deployment.…”
Section: Introductionmentioning
confidence: 99%