Matches in SemOpenAlex for { <https://semopenalex.org/work/W1559596490> ?p ?o ?g. }
- W1559596490 abstract "Due to significant advances in wireless and mobile communication techniques and the broad development of potential applications, Wireless Sensor Networks (WSNs) have attracted great attention in recent years. Nevertheless, WSNs are formed dynamically by a number of powerlimited sensor nodes and themanager nodewith long-lasting power. WSNs are self-organized and autonomous systems consisting of common sensors, manager nodes and back-end data center. Firstly, the common sensors are responsible for transmitting the real-time sensor data of specific monitoring environment to the intermediate collection nodes called manager node. Finally, the back-end data center will receive the sensed data from manager nodes to do further process and analysis. Undoubtedly, all communication between nodes are through the wireless transmission techniques. Furthermore, due to the property of self-organized, without support from the fixed infrastructure and the topology of wireless sensor network changes dynamically, therefore, broadcasting is the general way for communications in WSNs. Wireless sensor network has been widely used in practical applications, such as monitoring of forest fire, detection of military purpose, medical or science areas and even in our home life. However, WSNs are easily compromised by attackers due to wireless communications use a broadcast transmissionmedium and their lack of tamper resistance. Therefore, an attacker can eavesdrop on all traffic, inject malicious packets, replay older messages, or compromise a sensor node. Generally, sensor nodes are most worried about two major security issues, which are privacy preserving and node authentication. Privacy means the data confidentiality is achieved under security mechanism, and hence it allows network communications between sensor nodes and the manager station to proceed securely. In addition, a well-structured authentication mechanism can ensure that no unauthorized node is able to fraudulently participate and get sensitive information from WSNs. As a result, several schemes have been proposed to secure communications in WSNs. In this chapter, we classify them into three classifications based on the cryptographic techniques: symmetric keys, asymmetric keys and one-way hashing functions. The rest of this chapter is organized as follows: In Section 2, we introduce the characteristics and consideration of WSNs. In Section 3, we review some security threats and requirements in WSNs. Section 4 is for the security countermeasure schemes and its classification. Finally, we conclude some future works for the secure networking in WSNs. 17" @default.
- W1559596490 created "2016-06-24" @default.
- W1559596490 creator A5087133860 @default.
- W1559596490 date "2010-12-14" @default.
- W1559596490 modified "2023-10-03" @default.
- W1559596490 title "Security of Wireless Sensor Networks: Current Status and Key Issues" @default.
- W1559596490 cites W1567573409 @default.
- W1559596490 cites W188302415 @default.
- W1559596490 cites W1979615673 @default.
- W1559596490 cites W1991555694 @default.
- W1559596490 cites W1996360405 @default.
- W1559596490 cites W2008102763 @default.
- W1559596490 cites W2010288389 @default.
- W1559596490 cites W2023376407 @default.
- W1559596490 cites W2031731905 @default.
- W1559596490 cites W2036378739 @default.
- W1559596490 cites W2041694252 @default.
- W1559596490 cites W2045415897 @default.
- W1559596490 cites W2048995395 @default.
- W1559596490 cites W2051036654 @default.
- W1559596490 cites W2053342672 @default.
- W1559596490 cites W2061746221 @default.
- W1559596490 cites W2063764004 @default.
- W1559596490 cites W2075043017 @default.
- W1559596490 cites W2078915029 @default.
- W1559596490 cites W2080765376 @default.
- W1559596490 cites W2090249029 @default.
- W1559596490 cites W2107619464 @default.
- W1559596490 cites W2108834246 @default.
- W1559596490 cites W2110566685 @default.
- W1559596490 cites W2114027781 @default.
- W1559596490 cites W2115411894 @default.
- W1559596490 cites W2121192848 @default.
- W1559596490 cites W2130929645 @default.
- W1559596490 cites W2131409630 @default.
- W1559596490 cites W2134585683 @default.
- W1559596490 cites W2145422372 @default.
- W1559596490 cites W2146942801 @default.
- W1559596490 cites W2147001609 @default.
- W1559596490 cites W2151672144 @default.
- W1559596490 cites W2153343530 @default.
- W1559596490 cites W2155956719 @default.
- W1559596490 cites W2156186849 @default.
- W1559596490 cites W2159233774 @default.
- W1559596490 cites W2164478452 @default.
- W1559596490 cites W2406751384 @default.
- W1559596490 cites W2430154064 @default.
- W1559596490 cites W2742768030 @default.
- W1559596490 doi "https://doi.org/10.5772/13158" @default.
- W1559596490 hasPublicationYear "2010" @default.
- W1559596490 type Work @default.
- W1559596490 sameAs 1559596490 @default.
- W1559596490 citedByCount "12" @default.
- W1559596490 countsByYear W15595964902012 @default.
- W1559596490 countsByYear W15595964902013 @default.
- W1559596490 countsByYear W15595964902016 @default.
- W1559596490 countsByYear W15595964902020 @default.
- W1559596490 countsByYear W15595964902021 @default.
- W1559596490 countsByYear W15595964902022 @default.
- W1559596490 countsByYear W15595964902023 @default.
- W1559596490 crossrefType "book-chapter" @default.
- W1559596490 hasAuthorship W1559596490A5087133860 @default.
- W1559596490 hasBestOaLocation W15595964901 @default.
- W1559596490 hasConcept C119599485 @default.
- W1559596490 hasConcept C127413603 @default.
- W1559596490 hasConcept C148043351 @default.
- W1559596490 hasConcept C24590314 @default.
- W1559596490 hasConcept C26517878 @default.
- W1559596490 hasConcept C31258907 @default.
- W1559596490 hasConcept C38652104 @default.
- W1559596490 hasConcept C41008148 @default.
- W1559596490 hasConcept C555944384 @default.
- W1559596490 hasConcept C76155785 @default.
- W1559596490 hasConceptScore W1559596490C119599485 @default.
- W1559596490 hasConceptScore W1559596490C127413603 @default.
- W1559596490 hasConceptScore W1559596490C148043351 @default.
- W1559596490 hasConceptScore W1559596490C24590314 @default.
- W1559596490 hasConceptScore W1559596490C26517878 @default.
- W1559596490 hasConceptScore W1559596490C31258907 @default.
- W1559596490 hasConceptScore W1559596490C38652104 @default.
- W1559596490 hasConceptScore W1559596490C41008148 @default.
- W1559596490 hasConceptScore W1559596490C555944384 @default.
- W1559596490 hasConceptScore W1559596490C76155785 @default.
- W1559596490 hasLocation W15595964901 @default.
- W1559596490 hasLocation W15595964902 @default.
- W1559596490 hasOpenAccess W1559596490 @default.
- W1559596490 hasPrimaryLocation W15595964901 @default.
- W1559596490 hasRelatedWork W2130966263 @default.
- W1559596490 hasRelatedWork W2329452785 @default.
- W1559596490 hasRelatedWork W2356380379 @default.
- W1559596490 hasRelatedWork W2363925233 @default.
- W1559596490 hasRelatedWork W2364562957 @default.
- W1559596490 hasRelatedWork W2364808845 @default.
- W1559596490 hasRelatedWork W2366284060 @default.
- W1559596490 hasRelatedWork W2378314110 @default.
- W1559596490 hasRelatedWork W2510217115 @default.
- W1559596490 hasRelatedWork W3027915305 @default.
- W1559596490 isParatext "false" @default.
- W1559596490 isRetracted "false" @default.
- W1559596490 magId "1559596490" @default.