A new scheme of key distribution using implicit security in wireless sensor networks
ICACT'10 Proceedings of the 12th international conference on Advanced communication technology
Reliability of wireless sensors with code attestation for intrusion detection
Information Processing Letters
Key infection, secrecy transfer, and key evolution for sensor networks
IEEE Transactions on Wireless Communications
Security in Bluetooth, RFID and wireless sensor networks
Proceedings of the 2011 International Conference on Communication, Computing & Security
Smarter cities through standards-based wireless sensor networks
IBM Journal of Research and Development
Pairwise key establishment scheme for hypercube-based wireless sensor networks
Proceedings of the 15th WSEAS international conference on Computers
Applying time-bound hierarchical key assignment in wireless sensor networks
ICICS'11 Proceedings of the 13th international conference on Information and communications security
Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures
Journal of Network and Computer Applications
An efficient and lightweight user authentication scheme for wireless sensor networks
ICICA'11 Proceedings of the Second international conference on Information Computing and Applications
Survey Secure and reliable clustering in wireless sensor networks: A critical survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
Feasibility of position-based multivariate cryptosystems for WSN
International Journal of Internet Technology and Secured Transactions
An efficient anonymous communication protocol for wireless sensor networks
Wireless Communications & Mobile Computing
An adaptable and scalable group access control scheme for managing wireless sensor networks
Telematics and Informatics
A security adaptation reference monitor for wireless sensor network
ISRN Communications and Networking
Flooding attack in energy harvesting wireless sensor networks
Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication
Minimax control for cyber-physical systems under network packet scheduling attacks
Proceedings of the 2nd ACM international conference on High confidence networked systems
Proceedings of the Tenth Workshop on Visualization for Cyber Security
Protecting wireless sensor networks from energy exhausting attacks
ICCSA'13 Proceedings of the 13th international conference on Computational Science and Its Applications - Volume 1
Large scale wireless sensor networks with multi-level dynamic key management scheme
Journal of Systems Architecture: the EUROMICRO Journal
Management and applications of trust in Wireless Sensor Networks: A survey
Journal of Computer and System Sciences
Hi-index | 0.00 |
Wireless sensor networks (WSNs) use small nodes with constrained capabilities to sense, collect, and disseminate information in many types of applications. As sensor networks become wide-spread, security issues become a central concern, especially in mission-critical tasks. In this paper, we identify the threats and vulnerabilities to WSNs and summarize the defense methods based on the networking protocol layer analysis first. Then we give a holistic overview of security issues. These issues are divided into seven categories: cryptography, key management, attack detections and preventions, secure routing, secure location security, secure data fusion, and other security issues. Along the way we analyze the advantages and disadvantages of current secure schemes in each category. In addition, we also summarize the techniques and methods used in these categories, and point out the open research issues and directions in each area.