2014
DOI: 10.1155/2014/303501
|View full text |Cite
|
Sign up to set email alerts
|

Security Analysis in Wireless Sensor Networks

Abstract: In recent years, wireless sensor network (WSN) is employed in many application areas such as monitoring, tracking, and controlling. For many applications of WSN, security is an important requirement. However, security solutions in WSN differ from traditional networks due to resource limitation and computational constraints. This paper analyzes security solutions: TinySec, IEEE 802.15.4, SPINS, MiniSEC, LSec, LLSP, LISA, and LISP in WSN. The paper also presents characteristics, security requirements, attacks, e… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
39
0
2

Year Published

2015
2015
2020
2020

Publication Types

Select...
4
2
2

Relationship

1
7

Authors

Journals

citations
Cited by 57 publications
(41 citation statements)
references
References 26 publications
0
39
0
2
Order By: Relevance
“…This involves computing the AUC for each ROC curve, one curve is associated with one device, and then computing the mean of all curves considered. Table 3 presents verification results via %Aut, AUC and AUC M at SNR = [18,20,22] dB; further verification results will only be considered herein for SNR = 20dB (the SNR at which GRLVQI achieves %C = 90%). As seen in the %Aut column Table 3, the %Aut rate involves dichotomization, c.f.…”
Section: Verification Mean Auc (Auc M )mentioning
confidence: 99%
See 1 more Smart Citation
“…This involves computing the AUC for each ROC curve, one curve is associated with one device, and then computing the mean of all curves considered. Table 3 presents verification results via %Aut, AUC and AUC M at SNR = [18,20,22] dB; further verification results will only be considered herein for SNR = 20dB (the SNR at which GRLVQI achieves %C = 90%). As seen in the %Aut column Table 3, the %Aut rate involves dichotomization, c.f.…”
Section: Verification Mean Auc (Auc M )mentioning
confidence: 99%
“…As discussed in [16], PHY layer security involves either 1) adding physically traceable objects to devices [17] or 2) Radio Frequency Distinct Native Attribute (RF-DNA) fingerprinting based on PHY device emissions which overcome limitations of encryption key-based measures [18]. RF-DNA differs from typical WPAN defense and security strategies that target higher bitlevel network layers [19], i.e., the Network (NWK) and Media Access Control (MAC) layers [20]. Using underutilized PHY information [18] with NWK and MAC information yields a more robust biometric-like wireless security strategy that includes [18], [21]:…”
Section: Introductionmentioning
confidence: 99%
“…As shown in fig. 2, when node S 9 broadcasts its routing table, S 2 hears it via tunnel and updates its routing table that S 9 is one hop away and {S 8 , S 10 ,S 11 , S 12 , S 13 } all are two hops away. 2) On-Demand Protocol: The mechanism to discover the route in DSR [20] and AODV [21] protocols is an example of on demand protocols.…”
Section: Wormhole Threat Against Routing Protocols 1) Periodic Promentioning
confidence: 99%
“…An attacker can easily capture and compromise a few sensor nodes without being noticed. When sensor nodes are compromised, the attacker can learn all the secrets stored on them and launch a variety of attacks [7][8][9][10][11][12]. Thus any security mechanism for sensor networks has to be resilient to compromised sensor nodes.…”
mentioning
confidence: 99%
“…And the distance between any two nodes is more than 7 meters. The ID of node is orderly numbered by their distance to the Sink from near to Receiving Node adds its own information and rebroadcasts RDP; (6) else (7) Receiving Node drops RDP; (8) end if (9) end while (10) By using (17), the Sink computes the cost for the current route of the RDP; (11) Store the current RDP and its cost into Ω SourceNode → Sink ; (12) if Ω SourceNode → Sink is FULL; (13) By using (19), select the one with the least cost; (14) Sends the REP back to the Source Node over the selected route; (15) Generates the RER, and broadcasts the RER; (4) if (Monitoring Node == Source Node AND Monitored Node == Next Hop) (5) Deletes the route, and invokes Algorithm 1(a); (6) else if (Monitored Node == Next Hop) (7) Deletes the route; (8) end if; (9) end if; (10) while (Receiving Node ̸ = Source Node) (11) if (Sending Node == Next Hop OR Monitored Node == Next Hop) (12) Deletes the route; (13) end if; (14) Broadcast the RER; (15) end while; (16) far. Among the total number of the nodes in the experiment, 10 percent nodes are selected as the malicious nodes.…”
Section: Performance Evaluationmentioning
confidence: 99%