2021
DOI: 10.1109/access.2021.3131367
|View full text |Cite
|
Sign up to set email alerts
|

Secure and Reliable WSN for Internet of Things: Challenges and Enabling Technologies

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 40 publications
(24 citation statements)
references
References 119 publications
0
13
0
Order By: Relevance
“…In passive attacks, the attackers frequently Figure 1.1: A sample taxonomy for WSNs applications [8] disguise themselves and break the communication link to collect data. Passive attacks include eavesdropping, node malfunction, node tampering/destruction, node interruption, and traffic analysis [4].…”
Section: Passive Attacks In Wsnsmentioning
confidence: 99%
See 1 more Smart Citation
“…In passive attacks, the attackers frequently Figure 1.1: A sample taxonomy for WSNs applications [8] disguise themselves and break the communication link to collect data. Passive attacks include eavesdropping, node malfunction, node tampering/destruction, node interruption, and traffic analysis [4].…”
Section: Passive Attacks In Wsnsmentioning
confidence: 99%
“…A wireless sensor node is a compact device that includes sensing and computing components, as well as a wireless transmitter and a small battery [4]. Therefore, the majority of WSN devices have specific limitations, such as an environment without a centralized administration and limited computation capacity and power, which result in threats that expose WSNs to potentially hazardous attacks.…”
Section: Introduction 11 An Overview Of Security Issues In Wsnsmentioning
confidence: 99%
“…However authenticity of Boolean expression is not verified, that makes it susceptible to active attacks. In [16] mentioned that both industrial and commercial IoT devices are used as illustrations for analysing the security of hardware, applications, and communications, as well as identifying backdoors. On a smart home system and a smart metre, a detailed security analysis procedure will be demonstrated, demonstrating that security vulnerabilities are a common issue for most devices.…”
Section: Related Workmentioning
confidence: 99%
“…Wireless Sensor Networks (WSN) are often presented in the literature as a solution for large-scale autonomous monitoring systems [ 1 , 2 ]. They are typically composed of multiple sensor nodes (SN) scattered in a area of interest and a base station (BS).…”
Section: Introductionmentioning
confidence: 99%