Refine your search
Collections
Co-Authors
Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Aljwari, Fatimah Khalil
- Security In Wireless Sensor Networks: Comparative Study
Abstract Views :106 |
PDF Views:68
Authors
Affiliations
1 Advanced Computer Network, Jeddah University, Jeddah, SA
1 Advanced Computer Network, Jeddah University, Jeddah, SA
Source
AIRCC's International Journal of Computer Science and Information Technology, Vol 14, No 3 (2022), Pagination: 55-65Abstract
The security in wireless sensor networks (WSNS) is a very important issue. These networks may be exposed it different attacks. With this in mind, researchers propose in this area variety of security techniques for this purpose, and this article describes security in wireless sensor networks. Discussed threats and attacks of wireless sensor networks. The article also aims to provide the basic information related to determining essential requirements for the protection WSNs. Lastly, we mention some security mechanisms against these threats and attacks in Wireless Sensor Network.Keywords
Wireless Sensor Networks, Security Requirements, Attacks, Security Mechanisms.References
- V. Kumar, A. Jain, and P. N. Barwal, “Wireless Sensor Networks: Security Issues, Challenges and Solutions,” Int. J. Inf. Comput. Technol., vol. 4, no. 8, pp. 859–868, 2014, [Online]. Available: http://www.irphouse.com.
- M. Teymourzadeh, R. Vahed, S. Alibeygi, and N. Dastanpor, “Security in Wireless Sensor Networks: Issues and Challenges,” arXiv, 2020, doi: 10.47277/ijcncs/1(7)7.
- Y. X. Li, Lian-Qin, and Qian-Liang, “Research on wireless sensor network security,” Proc. - 2010 Int. Conf. Comput. Intell. Secur. CIS 2010, pp. 493–496, 2010, doi: 10.1109/CIS.2010.113.
- M. A. Khan, G. A. Shah, and M. Sher, “Challenges for security in Wireless sensor networks (WSNs),” World Acad. Sci. Eng. Technol., vol. 80, no. 8, pp. 390–396, 2011, doi: 10.5281/zenodo.1334423.
- A. Rani and S. Kumar, “A survey of security in wireless sensor networks,” 3rd IEEE Int. Conf. , pp. 3–7, 2017, doi: 10.1109/CIACT.2017.7977334.
- M. A. Elsadig, A. Altigani, and M. A. A. Baraka, “Security issues and challenges on wireless sensor networks,” Int. J. Adv. Trends Comput. Sci. Eng., vol. 8, no. 4, pp. 1551–1559, 2019, doi: 10.30534/ijatcse/2019/78842019.
- H. Modares, R. Salleh, and A. Moravejosharieh, “Overview of security issues in wireless sensor networks,” Proc. - CIMSim 2011 3rd Int. Conf. Comput. Intell. Model. Simul., pp. 308–311, 2011, doi: 10.1109/CIMSim.2011.62.
- D. Martins and H. Guyennet, “Wireless sensor network attacks and security mechanisms: A short survey,” Proc. - 13th Int. Conf. Network-Based Inf. Syst. NBiS 2010, pp. 313–320, 2010, doi: 10.1109/NBiS.2010.11.
- M. Al and K. Yoshigoe, “Security and attacks in wireless sensor networks,” Netw. Secur. Adm. Manag. Adv. Technol. Pract., vol. 14, no. 2, pp. 183–216, 2011, doi: 10.4018/978-1-60960-777-7.ch010.
- A. Nelli and S. Mangasuli, “Wireless Sensor Networks: An Overview on Security Issues and Challenges,” Int. J. Adv. Eng. Manag. Sci., vol. 3, no. 3, pp. 209–214, 2017, doi: 10.24001/ijaems.3.3.10.