2018 International Carnahan Conference on Security Technology (ICCST) 2018
DOI: 10.1109/ccst.2018.8585681
|View full text |Cite
|
Sign up to set email alerts
|

Analyzing the Vulnerability of Wireless Sensor Networks to a Malicious Matched Protocol Attack

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(2 citation statements)
references
References 10 publications
0
2
0
Order By: Relevance
“…Data conglomeration in remote sensor systems is essential because of its upgrade of transmission capacity use and vitality usage by limiting the exchange of excess information [19]. This paper displays a safe information accumulation convention, called SRDA, for remote sensor systems.…”
Section: Discussionmentioning
confidence: 99%
“…Data conglomeration in remote sensor systems is essential because of its upgrade of transmission capacity use and vitality usage by limiting the exchange of excess information [19]. This paper displays a safe information accumulation convention, called SRDA, for remote sensor systems.…”
Section: Discussionmentioning
confidence: 99%
“…The attacker can carry out a variety of malicious assaults by starting with these kinds of attacks [41]. Specific attacks that seek to affect the core functions of the network target some crucial WSN protocols, including routing, aggregation, and time synchronization [42].…”
Section: Impersonation Attacksmentioning
confidence: 99%