2005
DOI: 10.1007/11424857_75
|View full text |Cite
|
Sign up to set email alerts
|

On the Security of Wireless Sensor Networks

Abstract: Abstract. Wireless Sensor Networks are extremely vulnerable against any kind of internal or external attacks, due to several factors such as resource-constrained nodes and lack of tamper-resistant packages. As a result, security must be an important factor to have in mind when designing the infrastructure and protocols of sensor networks. In this paper we survey the "state-of-the-art" security issues in sensor networks and highlight the open areas of research.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2008
2008
2015
2015

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 25 publications
(15 citation statements)
references
References 33 publications
0
15
0
Order By: Relevance
“…The simplicity of WSNs routing protocols makes them an easy target for several malicious attacks [7,[11][12][13]. Based on Karlof and Wagner [7] research, we can classify the routing attacks into six categories: In addition, the unattended nature and the lack of tamper-resistant hardware cause wireless sensor networks to be vulnerable to various insider attacks, threatening the operation of WSNs.…”
Section: Attacks On Sensors Network Routingmentioning
confidence: 99%
“…The simplicity of WSNs routing protocols makes them an easy target for several malicious attacks [7,[11][12][13]. Based on Karlof and Wagner [7] research, we can classify the routing attacks into six categories: In addition, the unattended nature and the lack of tamper-resistant hardware cause wireless sensor networks to be vulnerable to various insider attacks, threatening the operation of WSNs.…”
Section: Attacks On Sensors Network Routingmentioning
confidence: 99%
“…Our framework is unique within existing, rule-based, security assessment strategies [16] [17] [18]. It enables the security quantification of both the WSN and the application to be performed.…”
Section: Our Proposed Security Assessment Frameworkmentioning
confidence: 99%
“…Various factors cause these rule-based/ theoretical security assessment frameworks to fail, especially in WSNs. These factors include the complex security algorithms, higher-bit encryption, hard-coded communication protocols, open system architectures, hybrid network models, and network deployment strategies [15] [16] [17] [18]. Some of these are elaborated below.…”
Section: Literature Surveymentioning
confidence: 99%
See 1 more Smart Citation
“…Therefore one essential requirement is that each sensor should consume as little power as possible. For additional discussion of this model, we refer to [4,21].…”
Section: Introductionmentioning
confidence: 99%