The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
Smart Wireless Sensor Networks 2010
DOI: 10.5772/14272
|View full text |Cite
|
Sign up to set email alerts
|

Security and Privacy in Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0
1

Year Published

2011
2011
2024
2024

Publication Types

Select...
5
2
2

Relationship

1
8

Authors

Journals

citations
Cited by 18 publications
(11 citation statements)
references
References 51 publications
0
10
0
1
Order By: Relevance
“…Since, the sensor nodes are deployed in open communication environment; they can easily be attacked during data transmission. Securing the WSN requires the network to support all the security properties: confidentiality, integrity, authenticity and availability [1]. Security attack is a concern for wireless sensor networks because:…”
Section: Introductionmentioning
confidence: 99%
“…Since, the sensor nodes are deployed in open communication environment; they can easily be attacked during data transmission. Securing the WSN requires the network to support all the security properties: confidentiality, integrity, authenticity and availability [1]. Security attack is a concern for wireless sensor networks because:…”
Section: Introductionmentioning
confidence: 99%
“…Este trabajo se centra en la seguridad y privacidad ante las vulnerabilidades técnicas propias de las WSN (Ukil, 2010; AlAmeen; Liu; Kwak, 2012). No tratamos otros aspectos como seguridad de los servidores, antivirus, copias de seguridad, etc.…”
Section: Introductionunclassified
“…Privacy issue in cloud computing is dealt in [2]. In [3], a nice scheme for handling data protection in terms of confidentiality through amalgamation of identity management with hierarchical identity-based cryptography is described.…”
Section: Related Workmentioning
confidence: 99%
“…In [2,13], it is described that cloud specific security solutions like confidentiality-enabled computing, userdefined authentication and access control, atomic data integrity are the main issues to be addressed.…”
Section: Open Challengesmentioning
confidence: 99%