Network Security 2010
DOI: 10.1007/978-0-387-73821-5_11
|View full text |Cite
|
Sign up to set email alerts
|

Attacks and Countermeasures in Sensor Networks: A Survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
39
0
2

Year Published

2011
2011
2019
2019

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 67 publications
(42 citation statements)
references
References 44 publications
0
39
0
2
Order By: Relevance
“…In contrast to previously published work [247,191,122,242,206,253,47,274], we try to give a more comprehensive overview and also discuss the attacks from the point of view of an inside adversary. For this, we consolidate and extend previous work on, amongst others, routing attacks [122], Denial-of-Service (DoS) attacks [247,191], various attacks [242,206,253,47,274] or new types of attacks [130,131].…”
Section: Types Of Outsider and Insider Attacksmentioning
confidence: 99%
“…In contrast to previously published work [247,191,122,242,206,253,47,274], we try to give a more comprehensive overview and also discuss the attacks from the point of view of an inside adversary. For this, we consolidate and extend previous work on, amongst others, routing attacks [122], Denial-of-Service (DoS) attacks [247,191], various attacks [242,206,253,47,274] or new types of attacks [130,131].…”
Section: Types Of Outsider and Insider Attacksmentioning
confidence: 99%
“…The security issues related to WSN has been raised by many researcher (Xing et al, 2010;Li and Gong, 2011;Manjula and Chellappan, 2012;Rathod and Mehta, 2011;Jatav et al, 2012;Gupta et al, 2012;Kim et al, 2012). As far as Science Publications JCS security requirement for WSN is concerned, it must ensure integrity and confidentiality of data and control messages exchanged between sensors and base stations.…”
Section: Introductionmentioning
confidence: 99%
“…sensors cooperate to each other and compose their local data to reach a global view of the environment; sensor nodes also can operate autonomously. In WSNs there are two other components, called "aggregation points" and "base stations" [3], which have more powerful resources than normal sensors. Aggregation points collect information from their nearby sensors, integrate them and then forward to the base stations to process gathered data, as shown in figure1.…”
Section: Introductionmentioning
confidence: 99%