TY - JOUR
T1 - Securing wireless sensor networks
T2 - a survey
AU - Ould Amara, Said
AU - Beghdad, Rachid
AU - Oussalah, Mourad
PY - 2013
Y1 - 2013
N2 - Wireless sensor networks (WSNs) are more widespread in diverse domains (military, medical, etc). So, these networks need a high level of security. However, because of their characteristics, WSN security is, today, the source of several scientific and technical challenges. In this context, lots of work has been realized and most existing security schemes require intensive computation and memory, which are the limiting factors in WSNs. It is very hard to accumulate all requirements in a single security mechanism, as WSNs have severe resources constraints. Before elaborating any security mechanism, it is crucial to take note of all security requirements and the different attacks to which WSNs are exposed as well as the works already realized in this context. This article discusses typical constraints, security goals, threat models, and typical attacks on sensor networks and their defensive techniques or countermeasures relevant to the sensor networks, including security methods.
AB - Wireless sensor networks (WSNs) are more widespread in diverse domains (military, medical, etc). So, these networks need a high level of security. However, because of their characteristics, WSN security is, today, the source of several scientific and technical challenges. In this context, lots of work has been realized and most existing security schemes require intensive computation and memory, which are the limiting factors in WSNs. It is very hard to accumulate all requirements in a single security mechanism, as WSNs have severe resources constraints. Before elaborating any security mechanism, it is crucial to take note of all security requirements and the different attacks to which WSNs are exposed as well as the works already realized in this context. This article discusses typical constraints, security goals, threat models, and typical attacks on sensor networks and their defensive techniques or countermeasures relevant to the sensor networks, including security methods.
UR - http://www.scopus.com/inward/record.url?scp=84873627377&partnerID=8YFLogxK
U2 - 10.1080/07366981.2013.754207
DO - 10.1080/07366981.2013.754207
M3 - Article
SN - 0736-6981
VL - 47
SP - 6
EP - 29
JO - EDPACS: the E D P audit, control and security newsletter
JF - EDPACS: the E D P audit, control and security newsletter
IS - 2
ER -