2017 3rd International Conference on Advances in Computing,Communication &Amp; Automation (ICACCA) (Fall) 2017
DOI: 10.1109/icaccaf.2017.8344727
|View full text |Cite
|
Sign up to set email alerts
|

Classification and analysis of security attacks in WSNs and IEEE 802.15.4 standards : A survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 26 publications
(9 citation statements)
references
References 20 publications
0
9
0
Order By: Relevance
“…This data sensing, collection, and transfer to hubs are governed by typical IoT protocols. Some of these protocols include [67][68][69][70]:…”
Section: Role Of Iot In Smsmentioning
confidence: 99%
See 1 more Smart Citation
“…This data sensing, collection, and transfer to hubs are governed by typical IoT protocols. Some of these protocols include [67][68][69][70]:…”
Section: Role Of Iot In Smsmentioning
confidence: 99%
“…It also allows efficiency in telemedicine. Broadly, the smart contracts apply to the following aspects of the healthcare system [69][70][71][72][73] These smart contracts identify the role, access mechanism, data ownerships, and data exchange policies. As blockchain is a distributed ledger technology that is immutable, there are no chances of data compromises or other tampering issues, as all the entities of the SMS system will be able to uniquely identify the legitimacy of each other.…”
Section: Blockchain In Smsmentioning
confidence: 99%
“…• Sleep period Following the standards of 802.11 IEEE, numerous efficient control methods such as sleeping, collision avoidance, synchronization, and listening are usually coupled with a contention-based MAC while implementing S-MAC. In principle, S-MAC employs a cyclic wake-up method wherein each node has its listening and sleeping period of the definite length according to its schedule [10]. In this method, every node switches to sleep mode for a defined period and then wakes up for subsequently fixed listening as shown in Fig.…”
Section: B Synchronization In S-macmentioning
confidence: 99%
“…In order to have full autonomy over the data transfer [28], the compromised node aims for its adjacent nodes. The sinkhole attack [10] is started by the rival nodes from the adjacent nodes that are very close to the base station.…”
Section: Sinkhole Attackmentioning
confidence: 99%
“…There require a large number of sensors deployed in harsh environments, and lack effective physical protection. Attackers often take advantage of these characteristics of wireless sensor network to carry out some malicious attacks [4]. Clone attack is an attack mode that captures some nodes in the sensor network, decrypts the internal secret information, and then massive copies these nodes and redeploys them to the network [5].…”
Section: Introductionmentioning
confidence: 99%