2021
DOI: 10.12928/telkomnika.v19i4.18464
|View full text |Cite
|
Sign up to set email alerts
|

Physical cyber-security algorithm for wireless sensor networks

Abstract: Today, the wireless sensor network (WSN) plays an important role in our daily life. In addition, it is used in many applications such as military, medical, greenhouse, and transport. Due to the sending data between its nodes or to the base station requires a connection link, the sensor nodes can be exposed to the many attacks that exploit the weaknesses of the network. One of the most important types of these attacks is the denial of service (DoS). DoS attack exhausts the system's resources that lead the syste… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 24 publications
0
4
0
Order By: Relevance
“…Also, through the implementation of a safe and efficient communication proxy, Yusoff et al [54] addressed the problem of IoT traffic security. In addition, for the physical level of the WSN that uses the message queuing telemetry transport (MQTT) protocol for data transfer and networking, a cyber-security method is described by Khudhur and Croock [55] and Magzoub et al [56].…”
Section: Figure 2 Overview Of Grey Hole Attack [19]mentioning
confidence: 99%
“…Also, through the implementation of a safe and efficient communication proxy, Yusoff et al [54] addressed the problem of IoT traffic security. In addition, for the physical level of the WSN that uses the message queuing telemetry transport (MQTT) protocol for data transfer and networking, a cyber-security method is described by Khudhur and Croock [55] and Magzoub et al [56].…”
Section: Figure 2 Overview Of Grey Hole Attack [19]mentioning
confidence: 99%
“…The previous model has capabilities to sense, predict and prevent DoS attacks in the network. Meanwhile, the other model added encryption to the IDS database for better security by using a single communication channel to detect intrusions [13], [14].…”
Section: Introductionmentioning
confidence: 99%
“…Watson and Crick's complementary DNA structure is used for DNA computing. Algebraic operations, such as DNA bases, DNA addition, DNA subtraction, and a DNA execlusive-or (XOR) function, are used to express biological characteristics [9]- [11].…”
Section: Introductionmentioning
confidence: 99%