2019
DOI: 10.5121/ijcses.2019.10102
|View full text |Cite
|
Sign up to set email alerts
|

Security and Key Management Challenges Over WSN (A Survey)

Abstract: Wireless sensor networks (WSNs) have turned to be the backbone of most present-day information technology, which supports the service-oriented architecture in a major activity. Sensor nodes and its restricted and limited resources have been a real challenge because there's a great engagement with sensor nodes and Internet Of things (IoT). WSN is considered to be the base stone of IoT which has been widely used recently in too many applications like smart cities, industrial internet, connected cars, connected h… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(5 citation statements)
references
References 28 publications
0
3
0
Order By: Relevance
“…On the other hand, digital signatures are a relatively recent technological development that authenticates the sender's identity concerning sent digital data. The recipient or a neutral party could independently verify this binding [11][12]. Digital signatures are cryptographic values calculated with data and keys known only to those who signed the documents [13].…”
Section: Introductionmentioning
confidence: 99%
“…On the other hand, digital signatures are a relatively recent technological development that authenticates the sender's identity concerning sent digital data. The recipient or a neutral party could independently verify this binding [11][12]. Digital signatures are cryptographic values calculated with data and keys known only to those who signed the documents [13].…”
Section: Introductionmentioning
confidence: 99%
“…Other attacks include Man-in-the-middle attack, Denial of Service (DoS) attack, password guessing in the offline attack, impersonation of user attack, and the smart card is stolen attack [24]. A man-in-the-Middle attack interrupts communication among two nodes.…”
Section: Introductionmentioning
confidence: 99%
“…IoT is applicable in medical, healthcare, industry, agriculture, security, vehicles and smart Home [4], [5], [6], [7], which are shown in Fig. 1.…”
Section: Introductionmentioning
confidence: 99%