Design, Automation &Amp; Test in Europe Conference &Amp; Exhibition (DATE), 2013 2013
DOI: 10.7873/date.2013.097
|View full text |Cite
|
Sign up to set email alerts
|

Wireless Sensor Network Simulation for Security and Performance Analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 0 publications
0
4
0
Order By: Relevance
“…Research conducted by Diaz et al [7] examines the attack vectors used against WSN with focus on the impact on power consumption and software execution time. The security vulnerabilities examined by the authors focuses on attacks against the physical and data link layer of the open systems interconnection (OSI) model.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Research conducted by Diaz et al [7] examines the attack vectors used against WSN with focus on the impact on power consumption and software execution time. The security vulnerabilities examined by the authors focuses on attacks against the physical and data link layer of the open systems interconnection (OSI) model.…”
Section: Literature Reviewmentioning
confidence: 99%
“…At this juncture, the stretch and carousal type of vampire attacks cannot be mitigated through cryptographic approaches as they are helpful only in preventing data tampering. 11 The vampire attack systematically and steadily forwards some data packets to a particular node to completely deplete their inherent energy and floods the network with useless messages that completely prevent its service or its availability to the other interacting sensor nodes. 12 Further, the cryptographic approaches are potent in facilitating strengthened security when the sensor nodes are a foreign nodes and are not a network constituent.…”
Section: Introductionmentioning
confidence: 99%
“…A brief introduction of the attack model is presented in [17]. In [17], a first version of the virtual simulator with a reduced group of attacks is presented.…”
Section: Introductionmentioning
confidence: 99%
“…A brief introduction of the attack model is presented in [17]. In [17], a first version of the virtual simulator with a reduced group of attacks is presented. There is another work [18] that is focused on the high-level design of the WSN and the attacks with UML-Marte (Unified Modeling Language) models.…”
Section: Introductionmentioning
confidence: 99%