Fifth International Conference on Advances in Recent Technologies in Communication and Computing (ARTCom 2013) 2013
DOI: 10.1049/cp.2013.2225
|View full text |Cite
|
Sign up to set email alerts
|

Wireless sensor network security threats

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(10 citation statements)
references
References 0 publications
0
9
0
Order By: Relevance
“…This section finds the more efficient protocols prevent the unauthorized person on WSNs network; those are password based, smart card based and biometrics based authentication. [9] C. Malisious Node WSN are unsafe across from many attackers. Attackers can easily add some malicious node in the network and can easily steal the important data.…”
Section: Some Other Issues In Security a Routing Protocols 1) Sigmentioning
confidence: 99%
“…This section finds the more efficient protocols prevent the unauthorized person on WSNs network; those are password based, smart card based and biometrics based authentication. [9] C. Malisious Node WSN are unsafe across from many attackers. Attackers can easily add some malicious node in the network and can easily steal the important data.…”
Section: Some Other Issues In Security a Routing Protocols 1) Sigmentioning
confidence: 99%
“…It is achieved by convincing the neighbor sensors that the adversary is one of the neighbors that is aiming at information exchange [8].…”
Section: Hello Flood Attackmentioning
confidence: 99%
“…The network is still facing the previous types of attacks but although the available resources within the network are limited additional techniques are needed beside cryptography to ensure the system security [10].…”
Section: Literature Reviewmentioning
confidence: 99%
“…The main drawback of such approach is that the attack could be detected by several mechanisms causing in redundant detection and high power consumption [10].…”
Section: Literature Reviewmentioning
confidence: 99%