Filters








13,608 Hits in 11.4 sec

Analysis of Security Threats, Requirements, Technologies and Standards in Wireless Sensor Networks [chapter]

Javier Lopez, Rodrigo Roman, Cristina Alcaraz
2009 Lecture Notes in Computer Science  
This paper offers both an overview and an analysis of the relationship between the different security threats, requirements, applications, and security technologies.  ...  Besides, it also overviews some of the existing sensor network standards, analyzing their security mechanisms. and their security mechanisms.  ...  The third author was funded by the Ministry of Education and Science of Spain under the "Programa Nacional de Formacion de Profesorado Universitario".  ... 
doi:10.1007/978-3-642-03829-7_10 fatcat:vke36pgqzfd5focrogfkf4ujxq

A Study on Security Vulnerability Management in Electric Power Industry IoT
전력 산업 IoT에서의 보안 취약점 관리에 관한 연구

Sang-Gi Lee, Sei-Yoon Lee, Jeong-Chul Kim
2016 Journal of Digital Contents Society  
And sensor network is vulnerable in security of physical position, accession, based on sensor network intrinsic features.  ...  Formerly discussed security threats of IoT IoT means an environment building intellectual relationship by wire-wireless network connection from various kinds of things with sensors and communication  ... 
doi:10.9728/dcs.2016.17.6.499 fatcat:3x2hwewn3ncg3dovhxixhxf3s4

Analyses of Open Security Issues for Smart Home and Sensor Network Based on Internet of Things [chapter]

Jung Tae (Steve) Kim
2022 IoT Applications Computing  
In this chapter, we analyzed security challenges and threats based on smart home network under IoT service.  ...  Many different types of object and devices are embedded in sensor node. They are inter-connected with optimized open system interconnection protocol over internet, wireless and wire medium.  ...  Previous works are focused on the security mechanism and data transmission in wire and wireless sensor network.  ... 
doi:10.5772/intechopen.97851 fatcat:6bkcdwr7z5hqfglpdcem7f2opu

Attacks and Threats on the U-Healthcare Application with Mobile Agent

Jung Tae Kim
2014 International Journal of Security and Its Applications  
But a lot of threats, attacks and vulnerability are induced because of limited resources such as small memory and low computation capability in wireless sensor network.  ...  Wireless sensor network is widespread used in hospital environment with mobile device such as NFC, RFID tag and small sensor nodes.  ...  This kind of network can be modified and extended based on the requirement of the security issues and protocol requirements.  ... 
doi:10.14257/ijsia.2014.8.4.06 fatcat:q5rxul7u25h7zluc6uc7rjkmza

Wireless Intrusion Detection System

Snehal Boob, Priyanka Jadhav
2010 International Journal of Computer Applications  
The rapid proliferation of wireless networks and mobile computing applications has changed the landscape of network security.  ...  Its technology is advancing and changing every day and its popularity is increasing. The biggest concern with wireless, however, has been security.  ...  In the security and wireless world this has fast become a major part of securing a network.  ... 
doi:10.5120/934-1312 fatcat:ixafehz6b5fenoedyjjfw2x6wy

A Comparative Analysis of Common Threats, Vulnerabilities, Attacks and Countermeasures Within Smart Card and Wireless Sensor Network Node Technologies [chapter]

Kevin Eagles, Konstantinos Markantonakis, Keith Mayes
2007 Lecture Notes in Computer Science  
The goal of this research was to determine "Security Lessons" learned from the world of smart cards that may be applied to wireless sensor network nodes and vice versa.  ...  A threat analysis framework and methodology was developed by the authors to catalogue threats, vulnerabilities, attacks and countermeasures for smart cards (contact and contactless) and wireless sensor  ...  ) to suit the adaptive nature of Wireless Sensor Networks.  ... 
doi:10.1007/978-3-540-72354-7_14 fatcat:de74z43m3zgd3gbvqxqeud2r3u

A Literature Review of Security Threats to Wireless Networks

Umesh Kumar, Sapna Gambhir
2014 International Journal of Future Generation Communication and Networking  
In the recent years we have huge development of wireless technology. We are presently getting more subject to wireless technology.  ...  As we know wireless networks have broadcast nature so there are different security issues in the wireless communication.  ...  Holistic view of security in wireless sensor networks is also described.  ... 
doi:10.14257/ijfgcn.2014.7.4.03 fatcat:aw662nqydffercciyrrip7swxq

Deployment of IoT based smart environment : key issues and challenges

Deepti Sehrawat, Nasib Singh Gill
2018 International Journal of Engineering & Technology  
A number of wireless sensor technologies are implemented in IoT viz. RFID, ZigBee, actuators, WiFi and wireless sensor networks (WSNs).  ...  This paper presents various security threats related to each IoT layer and the specific security requirements.  ...  Analysis of security requirements in IoT provides a step forward in providing secure IoT environment.  ... 
doi:10.14419/ijet.v7i2.9504 fatcat:6pi67dogxncdbniu5wgl7qy4da

Analysis of RFID Application for U-healthcare System in Internet of Things

Jung Tae Kim
2014 International Journal of Smart Home  
Therefore, a lot of threats, attacks and vulnerability are occurred in wireless surroundings because of their limited resources such as small memory and low computation capability in wireless sensor network  ...  RFID systems should be considered to resist all kinds of attacks and threats. Until now, many works have done about security issues how they can implement the standard cryptographic.  ...  RFID and wireless sensor network are combined core technologies that can be used for the IoT.  ... 
doi:10.14257/ijsh.2014.8.6.13 fatcat:kixqngaa4zcftbqopodhpjrucm

The use of Wireless Sensor Network for increasing airport security

Jakub Kraus, Petr Fajčík, Peter Vittek, Tomáš Duša
2013 MAD: Magazine of Aviation Development  
The article describes the sensor network and its possible application to various airport objects and financial analysis of the perimeter security with wireless sensor network.<strong> </strong></span>  ...  wireless sensor networks for airport security, respectively using sensor networks as a replacement or add-on to existing security measures.  ...  WIRELESS SENSOR NETWORK These new technology can be a wireless sensor network.  ... 
doi:10.14311/mad.2013.06.01 fatcat:2pec54dy45a3lgh656ch4qup7i

A Review of Security Concerns in Internet of Things

Engin Leloglu
2017 Journal of Computer and Communications  
The study defines security requirements and challenges that are common in IoT implementations and discusses security threats and related solutions on each layer of IoT architecture to make this technology  ...  This paper presents a general survey of all the security issues in IoT along with an analysis of IoT architectures.  ...  Security is an important concern for IoT technology because of following reasons [4] : • IoT is accepted as an extended version of some different technologies such as Wireless Sensor Networks, Mobile  ... 
doi:10.4236/jcc.2017.51010 fatcat:bqfhtpe33vff3kcvfjvzabbn5a

Analysis of Security Threats in Wireless Sensor Network

Sahabul Alam, Debashis De
2014 International Journal of Wireless & Mobile Networks  
The inclusion of wireless communication technology also incurs various types of security threats due to unattended installation of sensor nodes as sensor networks may interact with sensitive data and /  ...  Wireless Sensor Network(WSN) is an emerging technology and explored field of researchers worldwide in the past few years, so does the need for effective security mechanisms.  ...  THREAT ATTACKS IN WIRELESS SENSOR NETWORK Why is security necessary in WSN? Due to the broadcast nature of the transmission medium wireless sensor networks are vulnerable.  ... 
doi:10.5121/ijwmn.2014.6204 fatcat:sp4zlljusngtvgd7w4azalimvm

MODERN METHODS OF TESTING AND INFORMATION SECURITY PROBLEMS IN IoT

2021 Bulletin of TUIT: Management and Communication Technologies  
This article analyzes the technology of the internet of things, ie its architecture, communication standards, threats to security and safety, methods and types of testing devices of the internet of things  ...  In short, the architectures proposed by ITU-T and IWF, IEEE standards for Internet of Things, LPWAN standards, four levels of security (devices/gateways, network/transport, services and applications),  ...  IoT security threats. Security threats in IoT can be implemented in the following sections of the network: 1. Wireless data transmission systems; 2. Base station; 3.  ... 
doi:10.51348/tuitmct424 fatcat:e6znmuh4ufdkpec7yhjaa6i6cm

Secure wireless collection and distribution of commercial airplane health data

S. Lintelman, R. Robinson, Mingyan Li, L. Bushnell, R. Poovendran, K. Sampigethaya
2009 IEEE Aerospace and Electronic Systems Magazine  
We also present challenges and open problems in enabling secure use of wireless sensor networks for health monitoring and control of commercial airplanes.  ...  Therefore, this paper focuses on wireless airplane health monitoring and management, and contributes a security framework to identify threats and system requirements to mitigate these threats.  ...  However, in this paper, we consider insider threats for rigor and completeness of our security analysis.  ... 
doi:10.1109/maes.2009.5208555 fatcat:2eb3bexh4reivnqmd3f7w4pza4

Secure wireless collection and distribution of commercial airplane health data

Krishna Sampigethaya, Mingyan Li, Radha Poovendran, Richard Robinson
2007 2007 IEEE/AIAA 26th Digital Avionics Systems Conference  
We also present challenges and open problems in enabling secure use of wireless sensor networks for health monitoring and control of commercial airplanes.  ...  Therefore, this paper focuses on wireless airplane health monitoring and management, and contributes a security framework to identify threats and system requirements to mitigate these threats.  ...  However, in this paper, we consider insider threats for rigor and completeness of our security analysis.  ... 
doi:10.1109/dasc.2007.4391924 fatcat:l3gx5pgb7zdudoqa3pqd7m2fhy
« Previous Showing results 1 — 15 out of 13,608 results