Securing wireless sensor networks: a survey
Research output: Contribution to journal › Article › peer-review
Standard
Securing wireless sensor networks : a survey. / Ould Amara, Said; Beghdad, Rachid .
In: EDPACS: the E D P audit, control and security newsletter , Vol. 47, No. 2, 2013, p. 6-29.Research output: Contribution to journal › Article › peer-review
Harvard
APA
Vancouver
Author
Bibtex
}
RIS
TY - JOUR
T1 - Securing wireless sensor networks
T2 - a survey
AU - Ould Amara, Said
AU - Beghdad, Rachid
AU - Oussalah, Mourad
PY - 2013
Y1 - 2013
N2 - Wireless sensor networks (WSNs) are more widespread in diverse domains (military, medical, etc). So, these networks need a high level of security. However, because of their characteristics, WSN security is, today, the source of several scientific and technical challenges. In this context, lots of work has been realized and most existing security schemes require intensive computation and memory, which are the limiting factors in WSNs. It is very hard to accumulate all requirements in a single security mechanism, as WSNs have severe resources constraints. Before elaborating any security mechanism, it is crucial to take note of all security requirements and the different attacks to which WSNs are exposed as well as the works already realized in this context. This article discusses typical constraints, security goals, threat models, and typical attacks on sensor networks and their defensive techniques or countermeasures relevant to the sensor networks, including security methods.
AB - Wireless sensor networks (WSNs) are more widespread in diverse domains (military, medical, etc). So, these networks need a high level of security. However, because of their characteristics, WSN security is, today, the source of several scientific and technical challenges. In this context, lots of work has been realized and most existing security schemes require intensive computation and memory, which are the limiting factors in WSNs. It is very hard to accumulate all requirements in a single security mechanism, as WSNs have severe resources constraints. Before elaborating any security mechanism, it is crucial to take note of all security requirements and the different attacks to which WSNs are exposed as well as the works already realized in this context. This article discusses typical constraints, security goals, threat models, and typical attacks on sensor networks and their defensive techniques or countermeasures relevant to the sensor networks, including security methods.
UR - http://www.scopus.com/inward/record.url?scp=84873627377&partnerID=8YFLogxK
U2 - 10.1080/07366981.2013.754207
DO - 10.1080/07366981.2013.754207
M3 - Article
VL - 47
SP - 6
EP - 29
JO - EDPACS: the E D P audit, control and security newsletter
JF - EDPACS: the E D P audit, control and security newsletter
SN - 0736-6981
IS - 2
ER -