2017
DOI: 10.1080/1206212x.2017.1398214
|View full text |Cite
|
Sign up to set email alerts
|

Practical overview of security issues in wireless sensor network applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
27
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
7
2
1

Relationship

1
9

Authors

Journals

citations
Cited by 34 publications
(27 citation statements)
references
References 19 publications
0
27
0
Order By: Relevance
“…If the trusted third party wants to conduct periodic data integrity detection, the value of r can be moderate at this time. If the current network fluctuates greatly or the soft and hard environment is lack, the value of r can be reduced [14,15].…”
Section: Start Challengementioning
confidence: 99%
“…If the trusted third party wants to conduct periodic data integrity detection, the value of r can be moderate at this time. If the current network fluctuates greatly or the soft and hard environment is lack, the value of r can be reduced [14,15].…”
Section: Start Challengementioning
confidence: 99%
“…We are talking here about cryptanalysis. In this section, we talk about cryptography and the cryptographic systems used to secure the WSNs [86] [87].…”
Section: Basic Security Mechanisms In Wsnsmentioning
confidence: 99%
“…Wang et al [9] and Radhappa et al [10] summarized the current problems and open research questions that exist in wireless sensor networks. However, intrusion detection is not handled by them, with regard to port scanner and network mapping on low performance edge node devices.…”
Section: Related Workmentioning
confidence: 99%