2017
DOI: 10.3390/s17040771
|View full text |Cite
|
Sign up to set email alerts
|

Attack Classification Schema for Smart City WSNs

Abstract: Urban areas around the world are populating their streets with wireless sensor networks (WSNs) in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. Therefore, thi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
12
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 37 publications
(12 citation statements)
references
References 18 publications
0
12
0
Order By: Relevance
“…1) There is a need to analyze diverse scenarios (e.g., healthcare [86], smart city [87], military [88], and IoE) and derive additional security requirements for each scenario. Security requirements depend on specific environment and WSNs can be applied in myriad environments.…”
Section: Evaluation and Discussionmentioning
confidence: 99%
“…1) There is a need to analyze diverse scenarios (e.g., healthcare [86], smart city [87], military [88], and IoE) and derive additional security requirements for each scenario. Security requirements depend on specific environment and WSNs can be applied in myriad environments.…”
Section: Evaluation and Discussionmentioning
confidence: 99%
“…Smart city administrators must be aware that there is no black box technique that can detect any kind of attack and the affected equipment in a scenario such as the smart city. In fact, a complex procedure and a framework are proposed in [ 25 ] in order to assist smart city administrators to select the most probable attack, and delimit corrupted data and affected devices in case of incident.…”
Section: Discussionmentioning
confidence: 99%
“…The current state of the art reviewed above clearly shows that data analysis and anomaly detection cannot be based on statistical or rule-based approaches alone. These approaches should be combined with sophisticated techniques based on machine learning, as suggested in [ 25 , 26 ].…”
Section: Introductionmentioning
confidence: 99%
“…The main features of this system are a reduction in the number of communication messages due to the lack of additional control messages or monitor nodes in the IDS design and its applicability to large-scale networks. Garcia-Font et al [95] proposed a NIDS for WSNs that depends on a machine learning approach and a signature model. They used a signature-based detection engine and an anomaly-based detection engine to improve the detection rate and the FPR.…”
Section: Idss Designed For Iot Systemsmentioning
confidence: 99%