The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2020
DOI: 10.1007/s11277-020-07213-5
|View full text |Cite
|
Sign up to set email alerts
|

Cybersecurity Issues in Wireless Sensor Networks: Current Challenges and Solutions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
65
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
3
1

Relationship

1
9

Authors

Journals

citations
Cited by 51 publications
(65 citation statements)
references
References 79 publications
0
65
0
Order By: Relevance
“…WSN often operates in sectors like health care, climate change, room monitoring, agriculture, military, and other surveillance application. It operates the system as a group that collaborates with other neighbouring nodes and transmit data to the sink (Boubiche et al, 2020). Nodes in WSN are independent which can self-organize and self-healing.…”
Section: A Wireless Sensor Network Intrusion Detection System (Wsn-ids)mentioning
confidence: 99%
“…WSN often operates in sectors like health care, climate change, room monitoring, agriculture, military, and other surveillance application. It operates the system as a group that collaborates with other neighbouring nodes and transmit data to the sink (Boubiche et al, 2020). Nodes in WSN are independent which can self-organize and self-healing.…”
Section: A Wireless Sensor Network Intrusion Detection System (Wsn-ids)mentioning
confidence: 99%
“…In Boubiche et al, 71 the author talks about several studies that have been conducted for lightweight and efficient security protocols for WSNs. In this paper, the author reviews the most important protocols and categorize them based on the addressed security issue.…”
Section: Literature Reviewmentioning
confidence: 99%
“…This concern for wireless security can be resolved conspicuously by the algorithms developed for ensuring security of the physical layer. Unlike the traditional cryptographic [1] techniques which can be decrypted by the intruder, PLS schemes [2][3][4][5][6] exploit the temporal variations and reciprocity property of the wireless channel. In the former case, if the intruder possess exceptional computational capabilities, the goal of breaking the secret key can be easily accomplished.…”
Section: Introductionmentioning
confidence: 99%