2006 8th International Conference Advanced Communication Technology 2006
DOI: 10.1109/icact.2006.206151
|View full text |Cite
|
Sign up to set email alerts
|

Security in wireless sensor networks: issues and challenges

Abstract:  Wireless Sensor Network (WSN) is an emerging technology that shows great promise for various futuristic applications both for mass public and military. The sensing technology combined with processing power and wireless communication makes it lucrative for being exploited in abundance in future. The inclusion of wireless communication technology also incurs various types of security threats. The intent of this paper is to investigate the security related issues and challenges in wireless sensor networks. We i… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
191
0
2

Year Published

2010
2010
2022
2022

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 341 publications
(193 citation statements)
references
References 34 publications
0
191
0
2
Order By: Relevance
“…An attacker records a packet at one location transmit through and releases to another location. By using accurate location verification and clock synchronization we can prevent wormhole attack [1,6,8,11,13,15,16]. Following figure can illustrate the wormhole attack.…”
Section: Fig-1: Wireless Sensor Network Architecturementioning
confidence: 99%
“…An attacker records a packet at one location transmit through and releases to another location. By using accurate location verification and clock synchronization we can prevent wormhole attack [1,6,8,11,13,15,16]. Following figure can illustrate the wormhole attack.…”
Section: Fig-1: Wireless Sensor Network Architecturementioning
confidence: 99%
“…This example is closer to what we can do in wireless sensor networks if we try to apply this method in the 802.15.4 protocol. In wireless sensor networks, the use of steganography has been first mentioned in [9], with the conclusion that it would be difficult to apply it in wireless sensor network, because steganography is more applied with picture or video. However [10] and [11] show possibilities using noise in the physical layer of the 802.15.4 protocol to hide data and create a steganographic channel.…”
Section: Related Workmentioning
confidence: 99%
“…Due to either the real or imagined high quality route through the compromised node, it is likely each neighboring node of the adversary will forward packets destined for a BS through the adversary, and also propagate the attractiveness of the route to its neighbors. Effectively, the adversary creates a large "sphere of influence" [6], attracting all traffic destined for a BS from nodes several hops away from the compromised node. The possibility of using the radio signal strength to detect compromised nodes was studied in [7].…”
Section: Related Workmentioning
confidence: 99%