2015
DOI: 10.3390/s150102104
|View full text |Cite
|
Sign up to set email alerts
|

Sensor Data Security Level Estimation Scheme for Wireless Sensor Networks

Abstract: Due to their increasing dissemination, wireless sensor networks (WSNs) have become the target of more and more sophisticated attacks, even capable of circumventing both attack detection and prevention mechanisms. This may cause WSN users, who totally trust these security mechanisms, to think that a sensor reading is secure, even when an adversary has corrupted it. For that reason, a scheme capable of estimating the security level (SL) that these mechanisms provide to sensor data is needed, so that users can be… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0
1

Year Published

2015
2015
2023
2023

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 16 publications
(5 citation statements)
references
References 36 publications
0
4
0
1
Order By: Relevance
“…Alguns mecanismos são geralmente adotados para tentar garantir uma comunicação segura entre os dispositivos, como protocolos com criptografia, autenticação e atualização dos dados [Al-Janabi et al, 2017]. Entretanto, as redes de sensores sem fio têm vulnerabilidades, com ataques e mecanismos de segurança diferentes daqueles das redes tradicionais -devido às suas características peculiares como energia, memória e armazenamento limitados [Ramos e Filho, 2015].…”
Section: Segurança E Gerenciamento De Dados Médicosunclassified
“…Alguns mecanismos são geralmente adotados para tentar garantir uma comunicação segura entre os dispositivos, como protocolos com criptografia, autenticação e atualização dos dados [Al-Janabi et al, 2017]. Entretanto, as redes de sensores sem fio têm vulnerabilidades, com ataques e mecanismos de segurança diferentes daqueles das redes tradicionais -devido às suas características peculiares como energia, memória e armazenamento limitados [Ramos e Filho, 2015].…”
Section: Segurança E Gerenciamento De Dados Médicosunclassified
“…This framework uses both reputation and risk to evaluate the trustworthiness of a sensor node [ 20 ]. Ramos et al presented a new comprehensive security estimation scheme for WSNs to ensure the sensor data security [ 21 ]. Sicaria et al presented the main research challenges and the existing solutions in the field of IoT security, identify open issues, and make suggestions for future research [ 22 ].…”
Section: Related Workmentioning
confidence: 99%
“…According to Binmore's method [54], rational numbers are assigned to reflect players' preferences ranked in (1) and (2). Then, after being multiplied with their least common factor, the values of payoff functions and , free of fractions, can be formed in Table 1.…”
Section: Stage Intrusion Detection Gamementioning
confidence: 99%
“…One of the major issues that we must face is how to guarantee security of WSNs before they are widely applied. Similar to traditional networks, there are to realize secure WSNs and prevention-and detection-based mechanisms [2][3][4][5][6][7][8]. The prevention-based mechanism, which aims to prevent any attack before it occurs, includes cryptography, key management, and authentication.…”
Section: Introductionmentioning
confidence: 99%