Proceedings of the 2nd ACM International Workshop on Quality of Service &Amp; Security for Wireless and Mobile Networks 2006
DOI: 10.1145/1163673.1163675
|View full text |Cite
|
Sign up to set email alerts
|

An application-driven perspective on wireless sensor network security

Abstract: Wireless sensor networks (WSNs) have recently attracted a lot of interest due to the range of applications they enable. Unfortunately, WSNs are exposed to numerous security threats that can adversely affect the success of important applications. Securing WSNs is challenging due to their unique nature as an application and a network, and due to their limited capabilities. In this paper, we argue that the WSN security research generally considers mechanisms that are modeled after and evaluated against abstract a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2009
2009
2015
2015

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 37 publications
(13 citation statements)
references
References 31 publications
0
13
0
Order By: Relevance
“…Eric Sabbah, et al, [13] explained attacker motivation, vulnerabilities and opportunities currently available to hackers. Wireless sensor networks are exposed to numerous security threats that can endanger the success of the application.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Eric Sabbah, et al, [13] explained attacker motivation, vulnerabilities and opportunities currently available to hackers. Wireless sensor networks are exposed to numerous security threats that can endanger the success of the application.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Some protocols may expose the location of a destination in each packet, which could result in possible attacks on critical points of the infrastructure. These can be mitigated through the use of encryption at the cost of computational resources [3].…”
Section: A Context and Design Implicationsmentioning
confidence: 99%
“…Adversaries could extract transmitted data and modify it to their wishes (injection of false data). The end result could lead to falsified location of enemy forces [3].…”
Section: ) Practical Algorithm For Data Security (Pads)mentioning
confidence: 99%
“…Many WSNs' applications heavily rely on coordinated services such as localization, time synchronization, and in-network data processing to collaboratively process data (Sabbah et al, 2006). Unfortunately, these services represent unique vulnerabilities such as: False data filtering; Clock un-synchronization; False data injection.…”
Section: Application Layer Threatsmentioning
confidence: 99%