Nothing Special   »   [go: up one dir, main page]

skip to main content
article
Free access

Security in wireless sensor networks

Published: 01 June 2004 Publication History

Abstract

They are susceptible to a variety of attacks, including node capture, physical tampering, and denial of service, while prompting a range of fundamental research challenges.

Supplementary Material

PDF File (p53-perrig.jp.pdf)
Requires Asian Language Support in Adobe Reader and Japanese Language Support in Your Browser

References

[1]
Adamy, D. EW 101: A First Course in Electronic Warfare. Artech House Publishers, Norwood, MA, 2001.
[2]
Deng, J., Han, R., and Mishra, S. A performance evaluation of intrusion-tolerant routing in wireless sensor networks. In Proceedings of the 2nd IEEE International Workshop on Information Processing in Sensor Networks (IPSN 2003) (Apr. 2003), 349--364.
[3]
Eschenauer, L. and Gligor, V. A key-management scheme for distributed sensor networks. In Proceedings of the 9th ACM Conference on Computer and Communication Security (Washington, D.C., Nov.). ACM Press, New York, 2002, 41--47.
[4]
Hu, Y.-C., Perrig, A., and Johnson, D. Packet leashes: A defense against wormhole attacks in wireless ad hoc networks. In Proceedings of IEEE Infocom 2003 (San Francisco, Apr. 1--3, 2003).
[5]
Karlof, C. and Wagner, D. Secure routing in wireless sensor networks: Attacks and countermeasures. In Proceedings of the 1st IEEE International Workshop on Sensor Network Protocols and Applications (Anchorage, AK, May 11, 2003).
[6]
Perrig, A., Szewczyk, R., Wen, V., Culler, D., and Tygar, J. SPINS: Security protocols for sensor networks. J. Wireless Nets. 8, 5 (Sept. 2002), 521--534.
[7]
Przydatek, B., Song, D., and Perrig, A. SIA: Secure information aggregation in sensor networks. In Proceedings of the 1st ACM International Conference on Embedded Networked Sensor Systems (SenSys 2003) (Los Angeles, Nov. 5--7). ACM Press, New York, 2003, 255--265.
[8]
Wood, A., Stankovic, J., and Son, S. JAM: A mapping service for jammed regions in sensor networks. In Proceedings of the IEEE Real-Time Systems Symposium (Cancun, Mexico, Dec. 3--5, 2003).
[9]
Wood, A. and Stankovic, J. Denial of service in sensor networks. IEEE Comput. (Oct. 2002), 54--62.

Cited By

View all
  • (2025)Online Two-Stage Channel-Based Lightweight Authentication Method for Time-Varying ScenariosIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.351657520(781-795)Online publication date: 1-Jan-2025
  • (2024)Prioritization of types of wireless sensor networks by applying decision-making technique based on bipolar complex fuzzy linguistic heronian mean operatorsJournal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology10.3233/JIFS-23216746:1(967-990)Online publication date: 1-Jan-2024
  • (2024)ENHANCING RELIABILITY AND EFFICIENCY OF DETECTING MALICIOUS DATA INJECTION IN WIRELESS SENSOR NETWORKS: AN IN-DEPTH ANALYSISShodhKosh: Journal of Visual and Performing Arts10.29121/shodhkosh.v5.i5.2024.19005:5Online publication date: 31-May-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Communications of the ACM
Communications of the ACM  Volume 47, Issue 6
Wireless sensor networks
June 2004
93 pages
ISSN:0001-0782
EISSN:1557-7317
DOI:10.1145/990680
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 June 2004
Published in CACM Volume 47, Issue 6

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)582
  • Downloads (Last 6 weeks)66
Reflects downloads up to 13 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2025)Online Two-Stage Channel-Based Lightweight Authentication Method for Time-Varying ScenariosIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.351657520(781-795)Online publication date: 1-Jan-2025
  • (2024)Prioritization of types of wireless sensor networks by applying decision-making technique based on bipolar complex fuzzy linguistic heronian mean operatorsJournal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology10.3233/JIFS-23216746:1(967-990)Online publication date: 1-Jan-2024
  • (2024)ENHANCING RELIABILITY AND EFFICIENCY OF DETECTING MALICIOUS DATA INJECTION IN WIRELESS SENSOR NETWORKS: AN IN-DEPTH ANALYSISShodhKosh: Journal of Visual and Performing Arts10.29121/shodhkosh.v5.i5.2024.19005:5Online publication date: 31-May-2024
  • (2024)Cyberattack detection in wireless sensor networks using a hybrid feature reduction technique with AI and machine learning methodsJournal of Big Data10.1186/s40537-023-00870-w11:1Online publication date: 13-Jan-2024
  • (2024)A Reference Architecture for Data-Driven Intelligent Public Transportation SystemsIEEE Open Journal of Intelligent Transportation Systems10.1109/OJITS.2024.34410485(469-482)Online publication date: 2024
  • (2024)Comparative Analysis of Detection Techniques for Malicious Node Identification in Wireless Sensor Networks2024 4th International Conference on Ubiquitous Computing and Intelligent Information Systems (ICUIS)10.1109/ICUIS64676.2024.10866503(1500-1502)Online publication date: 12-Dec-2024
  • (2024)Lightweight Anonymous Authentication Frameworks for Wireless Sensor Networks2024 3rd International Conference on Computer Technologies (ICCTech)10.1109/ICCTech61708.2024.00014(28-33)Online publication date: 1-Feb-2024
  • (2024)Randomization Approaches for Secure SAR ADC Design Resilient Against Power Side-Channel Attacks2024 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)10.1109/HOST55342.2024.10545378(282-292)Online publication date: 6-May-2024
  • (2024)Clone node detection in static wireless sensor networks: A hybrid approachJournal of Network and Computer Applications10.1016/j.jnca.2024.104018(104018)Online publication date: Sep-2024
  • (2024)A detailed review of wireless sensor network, jammer, the types, location, detection and countermeasures of jammersService Oriented Computing and Applications10.1007/s11761-024-00396-w18:3(225-247)Online publication date: 1-Sep-2024
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Magazine Site

View this article on the magazine site (external)

Magazine Site

Login options

Full Access

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media