Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 7 publications
0
2
0
Order By: Relevance
“…Physical attacks by attackers, Trojan attacks, virus damage, keys decryption, DOS, eavesdropping and traffic analysis are really threats. The trouble challenge is a key distribution, encryption and decryption mechanism caused by wireless sensor networks large and resource constraints [15] [16]. There are some security's issues, including:…”
Section: Security Iot Issuesmentioning
confidence: 99%
“…Physical attacks by attackers, Trojan attacks, virus damage, keys decryption, DOS, eavesdropping and traffic analysis are really threats. The trouble challenge is a key distribution, encryption and decryption mechanism caused by wireless sensor networks large and resource constraints [15] [16]. There are some security's issues, including:…”
Section: Security Iot Issuesmentioning
confidence: 99%
“…In an ETC system, a large number of wireless sensor nodes are deployed at ETC lanes, and they are small in size and operate on small sized battery with very limited data processing power. Those wireless sensor nodes constitute a WSN by means of selforganization [6]. The sensor nodes are used to apperceive (acquire), dispose, and transmit information about the driver and the driving vehicle in ETC lanes.…”
Section: Motivation Formentioning
confidence: 99%
“…(4) Sinkhole attack Sinkhole attack is malicious nodes do everything to be a high-quality routing, to make the node information in this region sent to the base station or sink node through this fake route [9], the model is shown in Fig. 2.…”
Section: Wsns Suffered Typical Attacks In Smart Gridmentioning
confidence: 99%