2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT) 2013
DOI: 10.1109/icccnt.2013.6726654
|View full text |Cite
|
Sign up to set email alerts
|

Security for wireless sensor networks in military operations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 17 publications
(11 citation statements)
references
References 6 publications
0
11
0
Order By: Relevance
“…The diverse kinds of keys are utilized in the encryption method. The various protocols suggested by a several researchers to solve the WSN security problem [31] such as SPINS, Tinysec, Minisec, LEAP, LEDS, Lightweight LCG, MiniSec, MASA, VEBEK of WSN). Related works of the researcher on this aspect: In [32] This work display the first secrecy and integrity of data that try to add security depend on watermarking and crypto graphical mechanisms to watermarking LEACH named enhanced proved watermarking-LEACH to fulfill data secrecy and integrity.…”
Section: Security Protocols In Wsnsmentioning
confidence: 99%
“…The diverse kinds of keys are utilized in the encryption method. The various protocols suggested by a several researchers to solve the WSN security problem [31] such as SPINS, Tinysec, Minisec, LEAP, LEDS, Lightweight LCG, MiniSec, MASA, VEBEK of WSN). Related works of the researcher on this aspect: In [32] This work display the first secrecy and integrity of data that try to add security depend on watermarking and crypto graphical mechanisms to watermarking LEACH named enhanced proved watermarking-LEACH to fulfill data secrecy and integrity.…”
Section: Security Protocols In Wsnsmentioning
confidence: 99%
“…The military's wireless sensor network is vulnerable to various kinds of attacks like node capturing, eavesdropping, and forging [28]. It needs the security mechanism in order to protect itself from the security threats.…”
Section: Securitymentioning
confidence: 99%
“…In recent decades, multi-sensor networks have been widely used in many fields [1][2][3][4][5], such as battlefield surveillance, traffic control, healthcare, and environment monitoring. As a typical application in battlefield surveillance, target tracking by multi-sensor networks has been a research hotspot in recent years, especially in modern network warfare.…”
Section: Introductionmentioning
confidence: 99%