“…Since, the sensor nodes are deployed in open communication environment; they can easily be attacked during data transmission. Securing the WSN requires the network to support all the security properties: confidentiality, integrity, authenticity and availability [1]. Security attack is a concern for wireless sensor networks because:…”
-Wireless Sensor Network (WSN) is the combination of small devices called as sensor nodes which have sensing, computing and processing capabilities. Due to distributed nature of the WSNs, nodes are more vulnerable and can be physically accessible by an attacker; he/she can destroy the network and injects some extra bits in the information. An attacker can put some potential threats in the network. So, security is main concern in wireless sensor network especially in hostile environment. In this paper we focus on security requirements, threats and some security schemes that provide the solutions for such attacks.
“…Since, the sensor nodes are deployed in open communication environment; they can easily be attacked during data transmission. Securing the WSN requires the network to support all the security properties: confidentiality, integrity, authenticity and availability [1]. Security attack is a concern for wireless sensor networks because:…”
-Wireless Sensor Network (WSN) is the combination of small devices called as sensor nodes which have sensing, computing and processing capabilities. Due to distributed nature of the WSNs, nodes are more vulnerable and can be physically accessible by an attacker; he/she can destroy the network and injects some extra bits in the information. An attacker can put some potential threats in the network. So, security is main concern in wireless sensor network especially in hostile environment. In this paper we focus on security requirements, threats and some security schemes that provide the solutions for such attacks.
“…Este trabajo se centra en la seguridad y privacidad ante las vulnerabilidades técnicas propias de las WSN (Ukil, 2010; AlAmeen; Liu; Kwak, 2012). No tratamos otros aspectos como seguridad de los servidores, antivirus, copias de seguridad, etc.…”
“…Privacy issue in cloud computing is dealt in [2]. In [3], a nice scheme for handling data protection in terms of confidentiality through amalgamation of identity management with hierarchical identity-based cryptography is described.…”
Section: Related Workmentioning
confidence: 99%
“…In [2,13], it is described that cloud specific security solutions like confidentiality-enabled computing, userdefined authentication and access control, atomic data integrity are the main issues to be addressed.…”
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.