Boubiche et al., 2021 - Google Patents
Cybersecurity issues in wireless sensor networks: current challenges and solutionsBoubiche et al., 2021
- Document ID
- 12196412535241285205
- Author
- Boubiche D
- Athmani S
- Boubiche S
- Toral-Cruz H
- Publication year
- Publication venue
- Wireless Personal Communications
External Links
Snippet
Wireless sensor networks are deployed without predefined infrastructure and are generally left unattended. Indeed, the vulnerability of the wireless sensor networks to attacks comes principally from their inherent characteristics. As the data are transmitted over the air, it is …
- 238000011160 research 0 abstract description 12
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3242—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
- H04L2209/805—Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Boubiche et al. | Cybersecurity issues in wireless sensor networks: current challenges and solutions | |
Gautam et al. | A comprehensive study on key management, authentication and trust management techniques in wireless sensor networks | |
Walters et al. | Wireless sensor network security: A survey | |
Giruka et al. | Security in wireless sensor networks | |
Khan et al. | Recent advancements in intrusion detection systems for the internet of things | |
Patil et al. | Wireless sensor network security | |
Singh et al. | Security for wireless sensor network | |
Lin et al. | Energy efficiency routing with node compromised resistance in wireless sensor networks | |
Rathod et al. | Security in wireless sensor network: a survey | |
Conti | Secure wireless sensor networks | |
Drira et al. | ECGK: An efficient clustering scheme for group key management in MANETs | |
Sarma et al. | A hierarchical and role based secure routing protocol for mobile wireless sensor networks | |
Datta et al. | Security for mobile ad hoc networks | |
Claycomb et al. | A novel node level security policy framework for wireless sensor networks | |
Soundararajan et al. | Secure and concealed watchdog selection scheme using masked distributed selection approach in wireless sensor networks | |
Umar et al. | SeCRoP: secure cluster head centered multi‐hop routing protocol for mobile ad hoc networks | |
Trivedi et al. | Robust and secure routing protocols for MANET-based internet of things systems—A survey | |
Ukil | Wireless Sensor Networks | |
Zhang et al. | A dynamic authentication scheme for hierarchical wireless sensor networks | |
Haas et al. | Current challenges and approaches in securing communications for sensors and actuators | |
Zhang et al. | Privacy and integrity-preserving data aggregation scheme for wireless sensor networks digital twins | |
Alaali et al. | Mitigation of sinkhole attack in dynamic directional routing for mobile wireless sensor networks | |
Ouafaa et al. | Review on the attacks and security protocols for wireless sensor networks | |
Xue | Key Management Schemes for Distributed Sensor Networks | |
Ram et al. | Security Challenges in Wireless Sensor Network: Current Status and Future Trends |