2013
DOI: 10.5120/10718-5262
|View full text |Cite
|
Sign up to set email alerts
|

Categorized Security Threats in the Wireless Sensor Networks: Countermeasures and Security Management Schemes

Abstract: Sensor networks have been regarded as one of the emerging technologies of the 21 st century and have great future scope. They have been widely used in mission critical applications like military, health as well as civilian applications. The focus of this paper is on a security of sensor networks in various fields. Security is the major concern of a wireless sensor network especially in unattended areas. You will get a general introduction about wireless sensor networks in section I, section II explains the nee… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(10 citation statements)
references
References 11 publications
0
10
0
Order By: Relevance
“…These studies can usually be classified into two main categories. Some studies [12]- [17] are related to threats, such as constraints and vulnerabilities in WSNs, and other studies [18]- [26] focus on security requirements, such as countermeasures and solutions. The former usually highlighted that the vulnerabilities of WSNs are caused by constraints of WSNs, such as resource scarcity, insufficient memory, and unreliable communications.…”
Section: A Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…These studies can usually be classified into two main categories. Some studies [12]- [17] are related to threats, such as constraints and vulnerabilities in WSNs, and other studies [18]- [26] focus on security requirements, such as countermeasures and solutions. The former usually highlighted that the vulnerabilities of WSNs are caused by constraints of WSNs, such as resource scarcity, insufficient memory, and unreliable communications.…”
Section: A Related Workmentioning
confidence: 99%
“…The proposed security requirements in these studies are usually based on the constraints, vulnerabilities, threats, and other challenges. Some of these studies [18], [12], and [24] analyzed the security requirements of each component (i.e., node, data, network, and application) that composed WSNs, such as an analysis of the availability in a hierarchical structure in previous studies that analyzed the threats in WSNs. However, these studies focused on analyzing only security requirements and did not explain why security requirements are important.…”
Section: A Related Workmentioning
confidence: 99%
“…Sabeel et al [40] 2013 to fulfil the requirements and security challenges of sensor networks and categorises them on various security attacks and various security management schemes ✓ ✓ ✓ ✓ X ✓ ✓ good categorisation of various security attacks and countermeasures to handle them increased the level of security not covered the unattended area, where security threats in maximum…”
Section: Types Of Devicesmentioning
confidence: 99%
“…This mess up the communication among the devices of the entire network. For example, person A is replying a message to person B , but the message is expected from person C , here, person A becomes the active attacker [40–42]. Active attacks relating to real‐time data can include Authentication data such as Login ID and password. Digital certificates. One‐time passwords for online access. Biometric identification such as fingerprint, handwriting recognition, face recognition, voice recognition etc. Knowledge‐based questions like ‘what is your pet name?’ Social media data such as Facebook and Twitter. (b) Passive attacks: This type of attack involves snooping and monitoring of the communication in the IoT system.…”
Section: Bd Streaming Security In Iot Environment: a Taxonomymentioning
confidence: 99%
“…Reprogram attack: Reprogramming the IoT objects remotely as done in some environments can be achieved using a network programming system. Once the programming process is not protected, the attacker could hijack this procedure to control a large part of the network [140].…”
Section: Malicious Code Injectionmentioning
confidence: 99%