Singh et al., 2011 - Google Patents
Security for wireless sensor networkSingh et al., 2011
View PDF- Document ID
- 9498224361876178102
- Author
- Singh S
- Verma H
- Publication year
- Publication venue
- International Journal on Computer Science and Engineering
External Links
Snippet
Wireless Sensor Network is an emerging area that shows great future prospects. Today such networks are used in many industrial and consumer applications, such as military, industrial process, monitoring health and in automated and smart homes. So far, the researchers have …
- 230000002633 protecting 0 abstract description 10
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
- H04L2209/805—Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Almusaylim et al. | Proposing a secure RPL based internet of things routing protocol: a review | |
Raoof et al. | Routing attacks and mitigation methods for RPL-based Internet of Things | |
Singh et al. | Security for wireless sensor network | |
Kavitha et al. | Security vulnerabilities in wireless sensor networks: A survey | |
Sen | A survey on wireless sensor network security | |
Walters et al. | Wireless sensor network security: A survey | |
Hu et al. | Security considerations in ad hoc sensor networks | |
Zhou et al. | Securing wireless sensor networks: a survey | |
Giruka et al. | Security in wireless sensor networks | |
Zhang et al. | Location-based compromise-tolerant security mechanisms for wireless sensor networks | |
El Defrawy et al. | Privacy-preserving location-based on-demand routing in MANETs | |
Sen | Security in wireless sensor networks | |
Patil et al. | Wireless sensor network security | |
Sedjelmaci et al. | A lightweight hybrid security framework for wireless sensor networks | |
Sen et al. | Security threats in mobile ad hoc networks | |
Lee et al. | A secure alternate path routing in sensor networks | |
Kumar et al. | En-route filtering techniques in wireless sensor networks: a survey | |
Datta et al. | Security for mobile ad hoc networks | |
Chen et al. | Security in wireless sensor networks | |
Maan et al. | Vulnerability assessment of AODV and SAODV routing protocols against network routing attacks and performance comparisons | |
Jain et al. | Wireless sensor networks: Attacks and countermeasures | |
Habib | Sensor network security issues at network layer | |
Kannammal et al. | Survey on secure routing in mobile ad hoc networks | |
Panda et al. | MANET attacks and their countermeasures: a survey | |
Babu et al. | A secure routing protocol against heterogeneous attacks in wireless adhoc networks |