Securing wireless sensor networks: a survey

Research output: Contribution to journalArticlepeer-review

Standard

Securing wireless sensor networks : a survey. / Ould Amara, Said; Beghdad, Rachid .

In: EDPACS: the E D P audit, control and security newsletter , Vol. 47, No. 2, 2013, p. 6-29.

Research output: Contribution to journalArticlepeer-review

Harvard

APA

Vancouver

Author

Ould Amara, Said ; Beghdad, Rachid . / Securing wireless sensor networks : a survey. In: EDPACS: the E D P audit, control and security newsletter . 2013 ; Vol. 47, No. 2. pp. 6-29.

Bibtex

@article{b3ac252e908d4ecda462ee9e0ca8e2de,
title = "Securing wireless sensor networks: a survey",
abstract = "Wireless sensor networks (WSNs) are more widespread in diverse domains (military, medical, etc). So, these networks need a high level of security. However, because of their characteristics, WSN security is, today, the source of several scientific and technical challenges. In this context, lots of work has been realized and most existing security schemes require intensive computation and memory, which are the limiting factors in WSNs. It is very hard to accumulate all requirements in a single security mechanism, as WSNs have severe resources constraints. Before elaborating any security mechanism, it is crucial to take note of all security requirements and the different attacks to which WSNs are exposed as well as the works already realized in this context. This article discusses typical constraints, security goals, threat models, and typical attacks on sensor networks and their defensive techniques or countermeasures relevant to the sensor networks, including security methods. ",
author = "{Ould Amara}, Said and Rachid Beghdad and Mourad Oussalah",
year = "2013",
doi = "10.1080/07366981.2013.754207",
language = "English",
volume = "47",
pages = "6--29",
journal = "EDPACS: the E D P audit, control and security newsletter ",
issn = "0736-6981",
publisher = "Taylor & Francis",
number = "2",

}

RIS

TY - JOUR

T1 - Securing wireless sensor networks

T2 - a survey

AU - Ould Amara, Said

AU - Beghdad, Rachid

AU - Oussalah, Mourad

PY - 2013

Y1 - 2013

N2 - Wireless sensor networks (WSNs) are more widespread in diverse domains (military, medical, etc). So, these networks need a high level of security. However, because of their characteristics, WSN security is, today, the source of several scientific and technical challenges. In this context, lots of work has been realized and most existing security schemes require intensive computation and memory, which are the limiting factors in WSNs. It is very hard to accumulate all requirements in a single security mechanism, as WSNs have severe resources constraints. Before elaborating any security mechanism, it is crucial to take note of all security requirements and the different attacks to which WSNs are exposed as well as the works already realized in this context. This article discusses typical constraints, security goals, threat models, and typical attacks on sensor networks and their defensive techniques or countermeasures relevant to the sensor networks, including security methods.

AB - Wireless sensor networks (WSNs) are more widespread in diverse domains (military, medical, etc). So, these networks need a high level of security. However, because of their characteristics, WSN security is, today, the source of several scientific and technical challenges. In this context, lots of work has been realized and most existing security schemes require intensive computation and memory, which are the limiting factors in WSNs. It is very hard to accumulate all requirements in a single security mechanism, as WSNs have severe resources constraints. Before elaborating any security mechanism, it is crucial to take note of all security requirements and the different attacks to which WSNs are exposed as well as the works already realized in this context. This article discusses typical constraints, security goals, threat models, and typical attacks on sensor networks and their defensive techniques or countermeasures relevant to the sensor networks, including security methods.

UR - http://www.scopus.com/inward/record.url?scp=84873627377&partnerID=8YFLogxK

U2 - 10.1080/07366981.2013.754207

DO - 10.1080/07366981.2013.754207

M3 - Article

VL - 47

SP - 6

EP - 29

JO - EDPACS: the E D P audit, control and security newsletter

JF - EDPACS: the E D P audit, control and security newsletter

SN - 0736-6981

IS - 2

ER -