2023
DOI: 10.11591/ijece.v13i3.pp3131-3139
|View full text |Cite
|
Sign up to set email alerts
|

Survey on data aggregation based security attacks in wireless sensor network

Abstract: <p>Wireless sensor network (WSN) has applications in military, health care, environmental monitoring, infrastructure, industrial and commercial applications. The WSN is expected to maintain data integrity in all its network operations. However, due to the nature of wireless connectivity, WSN is prone to various attacks that alter or steal the data exchanged between the nodes. These attacks can disrupt the network processes and also the accuracy of its results. In this survey paper, we have reviewed vario… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 47 publications
(69 reference statements)
0
0
0
Order By: Relevance
“…Along with Figure 9, the graphs and percentages evidence that there was not a proper risk evaluation [28], and in some cases, they were not aware of the vulnerabilities in the IT infrastructure [29]. However, after the implementation of this proposal, you can see an increase in risk and vulnerability mitigation [30], and as a result, good cyber-security practices [31][32][33]. Undoubtedly, the role played by the ISO 27001 standard is fundamental in the protection of data and privacy in organizations, since information security can be protected in any type of company, regardless of its size and the economic activity to which it is dedicated.…”
Section: Comparison Chartmentioning
confidence: 93%
“…Along with Figure 9, the graphs and percentages evidence that there was not a proper risk evaluation [28], and in some cases, they were not aware of the vulnerabilities in the IT infrastructure [29]. However, after the implementation of this proposal, you can see an increase in risk and vulnerability mitigation [30], and as a result, good cyber-security practices [31][32][33]. Undoubtedly, the role played by the ISO 27001 standard is fundamental in the protection of data and privacy in organizations, since information security can be protected in any type of company, regardless of its size and the economic activity to which it is dedicated.…”
Section: Comparison Chartmentioning
confidence: 93%