2019 International Conference on Information Science and Communications Technologies (ICISCT) 2019
DOI: 10.1109/icisct47635.2019.9012015
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of Security Protocols in Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 14 publications
0
0
0
Order By: Relevance
“…Turakulovich et al [22] describe common communication layer attacks and specific security protocols for different communication technologies used in WSN. The paper compares the energy consumption of protocols to the number of mitigated threats.…”
Section: Extant Iot For Logistics Threat Models and Studiesmentioning
confidence: 99%
“…Turakulovich et al [22] describe common communication layer attacks and specific security protocols for different communication technologies used in WSN. The paper compares the energy consumption of protocols to the number of mitigated threats.…”
Section: Extant Iot For Logistics Threat Models and Studiesmentioning
confidence: 99%