[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Boubiche et al., 2021 - Google Patents

Cybersecurity issues in wireless sensor networks: current challenges and solutions

Boubiche et al., 2021

Document ID
12196412535241285205
Author
Boubiche D
Athmani S
Boubiche S
Toral-Cruz H
Publication year
Publication venue
Wireless Personal Communications

External Links

Snippet

Wireless sensor networks are deployed without predefined infrastructure and are generally left unattended. Indeed, the vulnerability of the wireless sensor networks to attacks comes principally from their inherent characteristics. As the data are transmitted over the air, it is …
Continue reading at link.springer.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3242Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • H04L2209/805Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network

Similar Documents

Publication Publication Date Title
Boubiche et al. Cybersecurity issues in wireless sensor networks: current challenges and solutions
Gautam et al. A comprehensive study on key management, authentication and trust management techniques in wireless sensor networks
Walters et al. Wireless sensor network security: A survey
Giruka et al. Security in wireless sensor networks
Khan et al. Recent advancements in intrusion detection systems for the internet of things
Patil et al. Wireless sensor network security
Singh et al. Security for wireless sensor network
Lin et al. Energy efficiency routing with node compromised resistance in wireless sensor networks
Rathod et al. Security in wireless sensor network: a survey
Conti Secure wireless sensor networks
Drira et al. ECGK: An efficient clustering scheme for group key management in MANETs
Sarma et al. A hierarchical and role based secure routing protocol for mobile wireless sensor networks
Datta et al. Security for mobile ad hoc networks
Claycomb et al. A novel node level security policy framework for wireless sensor networks
Soundararajan et al. Secure and concealed watchdog selection scheme using masked distributed selection approach in wireless sensor networks
Umar et al. SeCRoP: secure cluster head centered multi‐hop routing protocol for mobile ad hoc networks
Trivedi et al. Robust and secure routing protocols for MANET-based internet of things systems—A survey
Ukil Wireless Sensor Networks
Zhang et al. A dynamic authentication scheme for hierarchical wireless sensor networks
Haas et al. Current challenges and approaches in securing communications for sensors and actuators
Zhang et al. Privacy and integrity-preserving data aggregation scheme for wireless sensor networks digital twins
Alaali et al. Mitigation of sinkhole attack in dynamic directional routing for mobile wireless sensor networks
Ouafaa et al. Review on the attacks and security protocols for wireless sensor networks
Xue Key Management Schemes for Distributed Sensor Networks
Ram et al. Security Challenges in Wireless Sensor Network: Current Status and Future Trends