Authenticated Encryption in WSN Using eSTREAM Ciphers
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
DNCOCO'09 Proceedings of the 8th WSEAS international conference on Data networks, communications, computers
A new scheme of key distribution using implicit security in wireless sensor networks
ICACT'10 Proceedings of the 12th international conference on Advanced communication technology
A survey on secure multipath routing protocols in WSNs
Computer Networks: The International Journal of Computer and Telecommunications Networking
AIKED'11 Proceedings of the 10th WSEAS international conference on Artificial intelligence, knowledge engineering and data bases
A dynamic TDMA based scheme for securing query processing in WSN
Wireless Networks
Ensuring basic security and preventing replay attack in a query processing application domain in WSN
ICCSA'10 Proceedings of the 2010 international conference on Computational Science and Its Applications - Volume Part III
Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications
Journal of Medical Systems
Fine-grained analysis of packet loss symptoms in wireless sensor networks
Proceedings of the 11th ACM Conference on Embedded Networked Sensor Systems
Hi-index | 0.00 |
Due to inherent limitations in wireless sensor networks, security is a crucial issue. While research in WSN security is progressing at tremendous pace, no comprehensive document lists the security issues and the threat models which pose unique threats to the wireless sensor networks. In this paper we have made an effort to document all the known security issues in wireless sensor networks and have provided the research direction towards countermeasures against the threats posed by these issues.