scholarly journals Trust, Security, and Privacy in Next-Generation Wireless Sensor Networks 2014

2015 ◽  
Vol 11 (7) ◽  
pp. 958190
Author(s):  
Muhammad Khurram Khan ◽  
Yang Xiang ◽  
Shi-Jinn Horng ◽  
Hsiao-Hwa Chen
2013 ◽  
Vol 9 (10) ◽  
pp. 956736 ◽  
Author(s):  
Muhammad Khurram Khan ◽  
Yang Xiang ◽  
Shi-Jinn Horng ◽  
Hsiao-Hwa Chen

2016 ◽  
Vol 12 (1) ◽  
pp. 2462754 ◽  
Author(s):  
Guangjie Han ◽  
Zhangbing Zhou ◽  
Longjun Dong ◽  
Joel J. P. C. Rodrigues ◽  
Kamesh Namuduri

2017 ◽  
Vol 2017 ◽  
pp. 1-3 ◽  
Author(s):  
Fei Yu ◽  
Chin-Chen Chang ◽  
Jian Shu ◽  
Iftikhar Ahmad ◽  
Jun Zhang ◽  
...  

IJARCCE ◽  
2019 ◽  
Vol 8 (2) ◽  
pp. 1-8
Author(s):  
Ola Albeshri ◽  
Laila Nassef ◽  
Etimad Fadel

Author(s):  
Jaydip Sen

Wireless sensor networks (WSNs) have attracted a lot of interest in the research community due to their potential applicability in a wide range of real-world practical applications. However, due to the distributed nature and their deployments in critical applications without human interventions and sensitivity and criticality of data communicated, these networks are vulnerable to numerous security and privacy threats that can adversely affect their performance. These issues become even more critical in cognitive wireless sensor networks (CWSNs) in which the sensor nodes have the capabilities of changing their transmission and reception parameters according to the radio environment under which they operate in order to achieve reliable and efficient communication and optimum utilization of the network resources. This chapter presents a comprehensive discussion on the security and privacy issues in CWSNs by identifying various security threats in these networks and various defense mechanisms to counter these vulnerabilities. Various types of attacks on CWSNs are categorized under different classes based on their natures and targets, and corresponding to each attack class, appropriate security mechanisms are also discussed. Some critical research issues on security and privacy in CWSNs are also identified.


Sign in / Sign up

Export Citation Format

Share Document