A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Analysis of Security Threats, Requirements, Technologies and Standards in Wireless Sensor Networks
[chapter]
2009
Lecture Notes in Computer Science
This paper offers both an overview and an analysis of the relationship between the different security threats, requirements, applications, and security technologies. ...
Besides, it also overviews some of the existing sensor network standards, analyzing their security mechanisms. and their security mechanisms. ...
The third author was funded by the Ministry of Education and Science of Spain under the "Programa Nacional de Formacion de Profesorado Universitario". ...
doi:10.1007/978-3-642-03829-7_10
fatcat:vke36pgqzfd5focrogfkf4ujxq
A Study on Security Vulnerability Management in Electric Power Industry IoT
전력 산업 IoT에서의 보안 취약점 관리에 관한 연구
2016
Journal of Digital Contents Society
전력 산업 IoT에서의 보안 취약점 관리에 관한 연구
And sensor network is vulnerable in security of physical position, accession, based on sensor network intrinsic features. ...
Formerly discussed security
threats of IoT
IoT
means
an
environment
building
intellectual
relationship
by
wire-wireless
network connection from various kinds of
things with sensors and communication ...
doi:10.9728/dcs.2016.17.6.499
fatcat:3x2hwewn3ncg3dovhxixhxf3s4
Analyses of Open Security Issues for Smart Home and Sensor Network Based on Internet of Things
[chapter]
2022
IoT Applications Computing
In this chapter, we analyzed security challenges and threats based on smart home network under IoT service. ...
Many different types of object and devices are embedded in sensor node. They are inter-connected with optimized open system interconnection protocol over internet, wireless and wire medium. ...
Previous works are focused on the security mechanism and data transmission in wire and wireless sensor network. ...
doi:10.5772/intechopen.97851
fatcat:6bkcdwr7z5hqfglpdcem7f2opu
Attacks and Threats on the U-Healthcare Application with Mobile Agent
2014
International Journal of Security and Its Applications
But a lot of threats, attacks and vulnerability are induced because of limited resources such as small memory and low computation capability in wireless sensor network. ...
Wireless sensor network is widespread used in hospital environment with mobile device such as NFC, RFID tag and small sensor nodes. ...
This kind of network can be modified and extended based on the requirement of the security issues and protocol requirements. ...
doi:10.14257/ijsia.2014.8.4.06
fatcat:q5rxul7u25h7zluc6uc7rjkmza
Wireless Intrusion Detection System
2010
International Journal of Computer Applications
The rapid proliferation of wireless networks and mobile computing applications has changed the landscape of network security. ...
Its technology is advancing and changing every day and its popularity is increasing. The biggest concern with wireless, however, has been security. ...
In the security and wireless world this has fast become a major part of securing a network. ...
doi:10.5120/934-1312
fatcat:ixafehz6b5fenoedyjjfw2x6wy
A Comparative Analysis of Common Threats, Vulnerabilities, Attacks and Countermeasures Within Smart Card and Wireless Sensor Network Node Technologies
[chapter]
2007
Lecture Notes in Computer Science
The goal of this research was to determine "Security Lessons" learned from the world of smart cards that may be applied to wireless sensor network nodes and vice versa. ...
A threat analysis framework and methodology was developed by the authors to catalogue threats, vulnerabilities, attacks and countermeasures for smart cards (contact and contactless) and wireless sensor ...
) to suit the adaptive nature of Wireless Sensor Networks. ...
doi:10.1007/978-3-540-72354-7_14
fatcat:de74z43m3zgd3gbvqxqeud2r3u
A Literature Review of Security Threats to Wireless Networks
2014
International Journal of Future Generation Communication and Networking
In the recent years we have huge development of wireless technology. We are presently getting more subject to wireless technology. ...
As we know wireless networks have broadcast nature so there are different security issues in the wireless communication. ...
Holistic view of security in wireless sensor networks is also described. ...
doi:10.14257/ijfgcn.2014.7.4.03
fatcat:aw662nqydffercciyrrip7swxq
Deployment of IoT based smart environment : key issues and challenges
2018
International Journal of Engineering & Technology
A number of wireless sensor technologies are implemented in IoT viz. RFID, ZigBee, actuators, WiFi and wireless sensor networks (WSNs). ...
This paper presents various security threats related to each IoT layer and the specific security requirements. ...
Analysis of security requirements in IoT provides a step forward in providing secure IoT environment. ...
doi:10.14419/ijet.v7i2.9504
fatcat:6pi67dogxncdbniu5wgl7qy4da
Analysis of RFID Application for U-healthcare System in Internet of Things
2014
International Journal of Smart Home
Therefore, a lot of threats, attacks and vulnerability are occurred in wireless surroundings because of their limited resources such as small memory and low computation capability in wireless sensor network ...
RFID systems should be considered to resist all kinds of attacks and threats. Until now, many works have done about security issues how they can implement the standard cryptographic. ...
RFID and wireless sensor network are combined core technologies that can be used for the IoT. ...
doi:10.14257/ijsh.2014.8.6.13
fatcat:kixqngaa4zcftbqopodhpjrucm
The use of Wireless Sensor Network for increasing airport security
2013
MAD: Magazine of Aviation Development
The article describes the sensor network and its possible application to various airport objects and financial analysis of the perimeter security with wireless sensor network.<strong> </strong></span> ...
wireless sensor networks for airport security, respectively using sensor networks as a replacement or add-on to existing security measures. ...
WIRELESS SENSOR NETWORK These new technology can be a wireless sensor network. ...
doi:10.14311/mad.2013.06.01
fatcat:2pec54dy45a3lgh656ch4qup7i
A Review of Security Concerns in Internet of Things
2017
Journal of Computer and Communications
The study defines security requirements and challenges that are common in IoT implementations and discusses security threats and related solutions on each layer of IoT architecture to make this technology ...
This paper presents a general survey of all the security issues in IoT along with an analysis of IoT architectures. ...
Security is an important concern for IoT technology because of following reasons [4] : • IoT is accepted as an extended version of some different technologies such as Wireless Sensor Networks, Mobile ...
doi:10.4236/jcc.2017.51010
fatcat:bqfhtpe33vff3kcvfjvzabbn5a
Analysis of Security Threats in Wireless Sensor Network
2014
International Journal of Wireless & Mobile Networks
The inclusion of wireless communication technology also incurs various types of security threats due to unattended installation of sensor nodes as sensor networks may interact with sensitive data and / ...
Wireless Sensor Network(WSN) is an emerging technology and explored field of researchers worldwide in the past few years, so does the need for effective security mechanisms. ...
THREAT ATTACKS IN WIRELESS SENSOR NETWORK Why is security necessary in WSN? Due to the broadcast nature of the transmission medium wireless sensor networks are vulnerable. ...
doi:10.5121/ijwmn.2014.6204
fatcat:sp4zlljusngtvgd7w4azalimvm
MODERN METHODS OF TESTING AND INFORMATION SECURITY PROBLEMS IN IoT
2021
Bulletin of TUIT: Management and Communication Technologies
This article analyzes the technology of the internet of things, ie its architecture, communication standards, threats to security and safety, methods and types of testing devices of the internet of things ...
In short, the architectures proposed by ITU-T and IWF, IEEE standards for Internet of Things, LPWAN standards, four levels of security (devices/gateways, network/transport, services and applications), ...
IoT security threats. Security threats in IoT can be implemented in the following sections of the network: 1. Wireless data transmission systems; 2. Base station; 3. ...
doi:10.51348/tuitmct424
fatcat:e6znmuh4ufdkpec7yhjaa6i6cm
Secure wireless collection and distribution of commercial airplane health data
2009
IEEE Aerospace and Electronic Systems Magazine
We also present challenges and open problems in enabling secure use of wireless sensor networks for health monitoring and control of commercial airplanes. ...
Therefore, this paper focuses on wireless airplane health monitoring and management, and contributes a security framework to identify threats and system requirements to mitigate these threats. ...
However, in this paper, we consider insider threats for rigor and completeness of our security analysis. ...
doi:10.1109/maes.2009.5208555
fatcat:2eb3bexh4reivnqmd3f7w4pza4
Secure wireless collection and distribution of commercial airplane health data
2007
2007 IEEE/AIAA 26th Digital Avionics Systems Conference
We also present challenges and open problems in enabling secure use of wireless sensor networks for health monitoring and control of commercial airplanes. ...
Therefore, this paper focuses on wireless airplane health monitoring and management, and contributes a security framework to identify threats and system requirements to mitigate these threats. ...
However, in this paper, we consider insider threats for rigor and completeness of our security analysis. ...
doi:10.1109/dasc.2007.4391924
fatcat:l3gx5pgb7zdudoqa3pqd7m2fhy
« Previous
Showing results 1 — 15 out of 13,608 results