Abstract:The unique characteristics of wireless sensor networks make them susceptible to the attacks. The secure scheme is considered in designing the routing protocol and algorithm. The cryptography and authentication secure technology can defend the external attacks but have no way to protect the network when the internal attacks occur. However, the trust management scheme with attack-resistance and robustness can efficiently detect the internal attack. On the condition of defending the attacks, it is also an issue t… Show more
“…The authors of [65] suggest a lightweight encryption algorithm that can be run on FPGAs for WSNs. The effectiveness of the XTEA algorithm when employed in conjunction with the confused key was analyzed and compared to the performance of other classic lightweight encryption techniques [68] [77]. The authors of [66] suggest an ECC-based encryption scheme that makes use of homomorphism encryption.…”
Section: Authentication and Authorization Methodsmentioning
confidence: 99%
“…They demonstrated the improvement in performance as well as the increase of security in comparison to other methods already in use [37] [41]. A full analysis of the many different authentication mechanisms for the internet of things was published in reference [68]. In the field of Internet of Things communications employing WSNs, they examined more than forty different authentication methods and algorithms.…”
Section: Authentication and Authorization Methodsmentioning
Digital attacks include extorting money from users, altering, destroying, or gaining access to sensitive data, stopping regular business operations, and more. The medical and health sectors offer numerous potential for cyber security. Digital assaults can take many different forms, such as extorting money from users, destroying, altering, or accessing sensitive material in question areas, interfering with regular corporate operations, etc. Cybersecurity has various prospects in the health and medical sector. This research investigation's main goal is to concentrate safe practices in specific industries. It is very necessary starting with the second generation of computing and will continue to be so till there are computers and data in the digital realm. The medical fields of today also use digital communication and documentation. Such documents must be protected at the highest possible priority. As healthcare systems have delicate information, it becomes essential to protect such sensitive information from cyber threats. In smart healthcare systems, the patient's information is periodically collected and transmitted seamlessly to the decision-making system. However, protecting such sensitive data transmission from cyber threats becomes a challenging research problem at the edge layer. This paper addresses the challenges of cyber-attack and this study is greatly applicable for health sector.
“…The authors of [65] suggest a lightweight encryption algorithm that can be run on FPGAs for WSNs. The effectiveness of the XTEA algorithm when employed in conjunction with the confused key was analyzed and compared to the performance of other classic lightweight encryption techniques [68] [77]. The authors of [66] suggest an ECC-based encryption scheme that makes use of homomorphism encryption.…”
Section: Authentication and Authorization Methodsmentioning
confidence: 99%
“…They demonstrated the improvement in performance as well as the increase of security in comparison to other methods already in use [37] [41]. A full analysis of the many different authentication mechanisms for the internet of things was published in reference [68]. In the field of Internet of Things communications employing WSNs, they examined more than forty different authentication methods and algorithms.…”
Section: Authentication and Authorization Methodsmentioning
Digital attacks include extorting money from users, altering, destroying, or gaining access to sensitive data, stopping regular business operations, and more. The medical and health sectors offer numerous potential for cyber security. Digital assaults can take many different forms, such as extorting money from users, destroying, altering, or accessing sensitive material in question areas, interfering with regular corporate operations, etc. Cybersecurity has various prospects in the health and medical sector. This research investigation's main goal is to concentrate safe practices in specific industries. It is very necessary starting with the second generation of computing and will continue to be so till there are computers and data in the digital realm. The medical fields of today also use digital communication and documentation. Such documents must be protected at the highest possible priority. As healthcare systems have delicate information, it becomes essential to protect such sensitive information from cyber threats. In smart healthcare systems, the patient's information is periodically collected and transmitted seamlessly to the decision-making system. However, protecting such sensitive data transmission from cyber threats becomes a challenging research problem at the edge layer. This paper addresses the challenges of cyber-attack and this study is greatly applicable for health sector.
“…The proposed system greatly improves security and prevents trustless and malicious nodes from becoming the cluster head. Zhi Hu, et al [21] analyzed the attacks and designed the dynamic time window for the distributed trust model with the detection of direct trust and indirect trust. Here, only trusted nodes are considered and constructed the trusted tree, which is based on the path quality of nodes which is used as the gradient for routing.…”
In this era of emerging technology, Wireless Sensor Networks (WSN) has a huge number of Critical applications such as medical, smart grid monitoring the transformer, industries, etc. But Wireless Sensor Networks are susceptible to a large number of attacks due to its wireless nature. Security plays an important role for many real-world applications in WSNs. To develop secured WSNs, the intrusions should be detected before the attackers affect the sensor network. The modern surveys for different Intrusion Detection Systems (IDSs) in WSNs are considered in this paper. Initially, a general overview of flow-based IDSs is provided. Then, the survey reviews the related work on Cross-layer IDS and the applicability of those systems to WSNs. Then a brief survey is presented for Dynamic IDS. This is followed by trust-based IDS in WSN. Then, the survey reviews the related work on hybrid IDS in WSN. Finally, the survey for different ids in WSNs is analyzed. This paper highlights the open research issues in each of this field.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.