Being often deployed in remote or hostile environments, wireless sensor networks are vulnerable to various types of security attacks. A possible solution to reduce the security …
J Choi, J Ha, H Jeon - … on Personal, Indoor, and Mobile Radio …, 2013 - ieeexplore.ieee.org
In the past decades, physical layer security has been extensively studied to exploit fundamental capabilities of physical layer such as randomness in wireless channels, signal …
A Bashar, S Smys - IRO Journal on Sustainable Wireless …, 2021 - scholar.archive.org
This paper presents an analysis of Wireless Sensor Network (WSN) security issues that take place due to eavesdropping. The sensor-eavesdropper channels and the sensor sinks are …
X Li, J Xu, HN Dai, Q Zhao, CF Cheang… - Journal of Computational …, 2015 - Elsevier
This paper concerns the eavesdropping attacks from the eavesdroppers' perspective, which is new since most of current studies consider the problem from the good nodes' perspective …
A Ukil - Smart Wireless Sensor Networks, 2010 - books.google.com
Wireless Sensor Network (WSN) consists of mostly tiny, resource-constraint, simple sensor nodes, which communicate wirelessly and form ad hoc networks in order to perform some …
L Yuan, K Wang, T Miyazaki, S Guo… - 2017 IEEE International …, 2017 - ieeexplore.ieee.org
This paper focuses on the security issue in Cyber-Physical Systems. The sensor transmits the state estimation information to the remote controller via wireless networks. Due to the …
HN Dai, H Wang, H Xiao, X Li… - 2016 IEEE Intl …, 2016 - ieeexplore.ieee.org
Eavesdropping attacks have become one of major threats in wireless networks since it is the prerequisite of other malicious attacks. Most of current studies concentrate on designing anti …
The wireless sensor network (WSN) plays a fundamentally important role in the realization of Internet of Things and Industry 4.0. In this article, we study the physical layer security …
K Mehta, D Liu, M Wright - 2007 IEEE International Conference …, 2007 - ieeexplore.ieee.org
While many protocols for sensor network security provide confidentiality for the content of messages, contextual information usually remains exposed. Such information can be critical …