[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Singh et al., 2011 - Google Patents

Security for wireless sensor network

Singh et al., 2011

View PDF
Document ID
9498224361876178102
Author
Singh S
Verma H
Publication year
Publication venue
International Journal on Computer Science and Engineering

External Links

Snippet

Wireless Sensor Network is an emerging area that shows great future prospects. Today such networks are used in many industrial and consumer applications, such as military, industrial process, monitoring health and in automated and smart homes. So far, the researchers have …
Continue reading at sarthak-mittal.github.io (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • H04L2209/805Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service

Similar Documents

Publication Publication Date Title
Almusaylim et al. Proposing a secure RPL based internet of things routing protocol: a review
Raoof et al. Routing attacks and mitigation methods for RPL-based Internet of Things
Singh et al. Security for wireless sensor network
Kavitha et al. Security vulnerabilities in wireless sensor networks: A survey
Sen A survey on wireless sensor network security
Walters et al. Wireless sensor network security: A survey
Hu et al. Security considerations in ad hoc sensor networks
Zhou et al. Securing wireless sensor networks: a survey
Giruka et al. Security in wireless sensor networks
Zhang et al. Location-based compromise-tolerant security mechanisms for wireless sensor networks
El Defrawy et al. Privacy-preserving location-based on-demand routing in MANETs
Sen Security in wireless sensor networks
Patil et al. Wireless sensor network security
Sedjelmaci et al. A lightweight hybrid security framework for wireless sensor networks
Sen et al. Security threats in mobile ad hoc networks
Lee et al. A secure alternate path routing in sensor networks
Kumar et al. En-route filtering techniques in wireless sensor networks: a survey
Datta et al. Security for mobile ad hoc networks
Chen et al. Security in wireless sensor networks
Maan et al. Vulnerability assessment of AODV and SAODV routing protocols against network routing attacks and performance comparisons
Jain et al. Wireless sensor networks: Attacks and countermeasures
Habib Sensor network security issues at network layer
Kannammal et al. Survey on secure routing in mobile ad hoc networks
Panda et al. MANET attacks and their countermeasures: a survey
Babu et al. A secure routing protocol against heterogeneous attacks in wireless adhoc networks