2018
DOI: 10.2139/ssrn.3170185
|View full text |Cite
|
Sign up to set email alerts
|

Wireless Sensor Networks: Attacks and Countermeasures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
3
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 33 publications
0
3
0
Order By: Relevance
“…However, the security problem that may exist in WSNs has been ignored. In fact, WSNs have faced series of security problems, such as information stealing and modification, DOS attacks and so on [17], [18]. These problems disturb the normal information transmission, and even lead to the disclosure of confidential information.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…However, the security problem that may exist in WSNs has been ignored. In fact, WSNs have faced series of security problems, such as information stealing and modification, DOS attacks and so on [17], [18]. These problems disturb the normal information transmission, and even lead to the disclosure of confidential information.…”
Section: Introductionmentioning
confidence: 99%
“…In the literatures, most of the researches on the security of sensor networks focused on the upper layer of OSI model. For example, to prevent WSNs from eavesdropping, cryptographic technology was utilized in [17]; To guard against traffic analysis attacks, packet transmission rate was controlled in [18]. However, these solutions based on the upper layers will bring a large amount of running and storage overhead, which is not adaptable to WSNs due to the energy, memory and other limitations on sensor nodes.…”
Section: Introductionmentioning
confidence: 99%
“…In this section, the well-known attacks are classified according to their effects on the layers of WSN [6]- [8]. Fig.…”
mentioning
confidence: 99%