A security analysis for wireless sensor mesh networks in highly critical systems
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
A survey on key management mechanisms for distributed Wireless Sensor Networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Implementation of multivariate quadratic quasigroup for wireless sensor network
Transactions on computational science XI
Early warning system for cascading effect control in energy control systems
CRITIS'10 Proceedings of the 5th international conference on Critical Information Infrastructures Security
Denial of service mitigation approach for IPv6-enabled smart object networks
Concurrency and Computation: Practice & Experience
Addressing situational awareness in critical domains of a smart grid
NSS'12 Proceedings of the 6th international conference on Network and System Security
Diagnosis mechanism for accurate monitoring in critical infrastructure protection
Computer Standards & Interfaces
Hi-index | 0.00 |
As sensor networks are more and more being implemented in real world settings, it is necessary to analyze how the different requirements of these real-world applications can influence the security mechanisms. This paper offers both an overview and an analysis of the relationship between the different security threats, requirements, applications, and security technologies. Besides, it also overviews some of the existing sensor network standards, analyzing their security mechanisms.