Wireless sensor network security analysis

HK Kalita, A Kar - … Journal of Next-Generation Networks (IJNGN), 2009 - papers.ssrn.com
… on security of Wireless Sensor Network in this paper. We propose some of the security goal
for Wireless Sensor Network… Attack 3.18 Wormhole/Network Layer. A routing attack where an …

Naming content on the network layer: A security analysis of the information-centric network model

E Mannes, C Maziero - ACM Computing Surveys (CSUR), 2019 - dl.acm.org
security threats and their countermeasures introduced by naming content directly on the
network layer… , classification, and discussion of ICN security issues and their possible solutions. …

Internet of things security analysis

G Gan, Z Lu, J Jiang - 2011 international conference on internet …, 2011 - ieeexplore.ieee.org
… be applied to Internet of Things and provide security as authentication encryption and
mechanisms. However, according to the characteristics of the network layer, we need to adjust the …

OpenFlow: A security analysis

R Klöti, V Kotronis, P Smith - … Conference on Network Protocols …, 2013 - ieeexplore.ieee.org
… This module sets the following header values to wildcards: link and network layer source
addresses, transport layer source port and the physical switch port. The forwarding behaviour …

Enabling network-layer security on IPv6 wireless sensor networks

J Granjal, E Monteiro, JSS Silva - 2010 IEEE Global …, 2010 - ieeexplore.ieee.org
… Our analysis on the resources required from real sensor … of employing security at the network
layer for 6lowpan packets. … end-to-end security at the network layer on IPv6-enabled WSNs. …

Self-organized network-layer security in mobile ad hoc networks

H Yang, X Meng, S Lu - … of the 1st ACM workshop on Wireless security, 2002 - dl.acm.org
… Protecting the network layer in a mobile ad hoc network is an important research topic in
wireless security. This paper describes our unified network-layer security solution in ad hoc …

A survey of IoT security based on a layered architecture of sensing and data analysis

H Mrabet, S Belguith, A Alhomoud, A Jemai - Sensors, 2020 - mdpi.com
… a security analysis of IoT based on an in-depth analysis of the use of WSNs, their vulnerabilities
and their major security … A common attack in the network layer is the man-in-the-middle (…

Networklayer security for the Internet of Things using TinyOS and BLIP

J Granjal, E Monteiro, JS Silva - International Journal of …, 2014 - Wiley Online Library
… our following analysis on the impact of security on … network-layer security in the context of
the IP Security architecture, we also address the other (current and future) mandatory security

Sensor network security issues at network layer

A Habib - 2008 2nd International Conference on Advances in …, 2008 - ieeexplore.ieee.org
… at the network layer, and we shall mainly discuss only on the security threats at this layer in
… the sensor data packets over the network and route them to some traffic analysis system [9]. …

Towards scalable security analysis using multi-layered security models

JB Hong, DS Kim - Journal of Network and Computer Applications, 2016 - Elsevier
analysis, given the model is decomposable. However, we focus not only on the availability
modeling and analysis, but a broad field of security analysis using various security metrics. …