2008
DOI: 10.1109/comst.2008.4625802
|View full text |Cite
|
Sign up to set email alerts
|

Securing wireless sensor networks: a survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
212
0
3

Year Published

2010
2010
2023
2023

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 355 publications
(215 citation statements)
references
References 116 publications
0
212
0
3
Order By: Relevance
“…Over the years, attempts have been made to use different solutions using eg. 802.15.4 physical layer protocol to transmit hidden content [21] [22]. These works demonstrated the potential issues associated with knowledge areas of creating a special hidden information channels in WSN networks.…”
Section: A Wsn Routing Protocolsmentioning
confidence: 99%
“…Over the years, attempts have been made to use different solutions using eg. 802.15.4 physical layer protocol to transmit hidden content [21] [22]. These works demonstrated the potential issues associated with knowledge areas of creating a special hidden information channels in WSN networks.…”
Section: A Wsn Routing Protocolsmentioning
confidence: 99%
“…However [10] and [11] show possibilities using noise in the physical layer of the 802.15.4 protocol to hide data and create a steganographic channel. If these examples are known possibilities for using the 802.15.4 protocol to hide data, and show that steganography is a new way of research in wireless sensor network, to the best of our knowledge [12], we do not know of an example of steganography using communication of MAC layer fields in the 802.15.4 protocol.…”
Section: Related Workmentioning
confidence: 99%
“…The fake nodes can then send false link layer acknowledgements or inject false data into the network [97]. An excellent survey of the information security vulnerabilities of wireless sensor networks can be found in [98] and a survey of proposed defence mechanisms has been provided in [99]. Here, we will focus on research carried out specifically on the information security of sensor networks that have been used or proposed for EM.…”
Section: Terrestrial Sensor Networkmentioning
confidence: 99%