Abstract
The secured link between the sink and the sensing nodes in the WSN is a vital factor in many applicable fields. There are many applications of this network concern the human life or the national security of the countries. In this chapter, the different threats of WSN are discussed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Roy DB, Chaki R, Chaki N (2009) A new cluster-based wormhole intrusion detection algorithm for mobile ad-hoc networks. Int J Netw Secur Appl (IJNSA) 1(1): 44–52
Shanti N, Ganesan L, Ramar K (2009) Study of different attacks on multicast mobile ad-hoc network. J Theor Appl Inform Technol 45–51
Wei C, Xiang L, Yuebin B, Xiaopeng G (2007) A new solution for resisting gray hole attack in mobile ad-hoc networks. In: Second international conference on communications and networking in China, pp 366–370
Parsons M, Ebinger P. Performance evaluation of the impact of attacks on mobile ad-hoc networks. https://www.cse.buffalo.edu/duvms2009_submission_parsons.pdf
Bloom JA, Cox IJ, Kalker T, Linnartz JPMG, Miller ML, Traw CBS (1999) Copy protection for DVD video. Proc IEEE 87:1267–1276
Chen M, He Y, Lagendijk RL (2005) A fragile watermark error detection scheme for wireless video communications. IEEE Trans Multimed 7:315–329
Luis P-F, Pedro C, Juan RT-P, Fernando P-F (2006) Watermarking security: a survey. LNCS Trans Data Hiding Multimed Secur 1:41–72
Chuhong F, Kundur D, Kwong RH (2006) Analysis and design of secure watermark-based authentication systems. IEEE Trans Inf Forensics Secur 1:43–55
Jani PV (2002) Security within ad-hoc networks. Position paper, PAMPAS workshop, 16/17 Sept 2002
Pathan ASK, Hyung L, Hong CS (2006) Security in wireless sensor networks: issues and challenges. In: Proceedings of 8th IEEE international conference on advanced communication technology, Phoenix Park, vol 2, pp 1043–1048
Perrig A, Przydatek B, Song D (2007) SIA: Secure Information Aggregation in sensor networks. J Comput Secur 15:69–102
Chen M, He Y, Lagendijk RL (2001) Error detection by fragile watermarking. In: Proceedings of the 22nd of the picture coding symposium, Seoul, pp 287–290
Ren X, Yu H (2006) Security mechanisms for wireless sensor networks. Int J Comput Sci Netw Secur 6:151–161
Dargie W, Poellabauer C (2010) Fundamental of wireless sensor networks theory and practice. Wiley, Series on Wireless Communications and Mobile Computing
Sastry N, Wagner D (2004) Security considerations for IEEE 802.15.4 networks. In: Proceedings of the 3rd ACM workshop on wireless security, Philadelphia
Durresi A, Paruchuri V, Kannan R, Lyengar SS (2005) Data integrity protocol for sensor networks. Int J Distrib Sens Netw 1:205–214
Venugopalan R, Ganesan P, Peddabachagari P, Dean A, Mueller F, Sichitiu M (2003) Encryption overhead in embedded systems and sensor network nodes: modeling and analysis. In: Proceedings of international conference on compilers, architectures and synthesis for embedded systems, San Jose, pp 188–197. Sensors 2011, 11:4135
Hartung F, Kutter M (1999) Multimedia watermarking techniques. Proc IEEE 87:1079–1107
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer Japan
About this chapter
Cite this chapter
El-Bendary, M.A.M. (2015). WSN Security Needs. In: Developing Security Tools of WSN and WBAN Networks Applications. Lecture Notes in Electrical Engineering, vol 316. Springer, Tokyo. https://doi.org/10.1007/978-4-431-55069-3_5
Download citation
DOI: https://doi.org/10.1007/978-4-431-55069-3_5
Published:
Publisher Name: Springer, Tokyo
Print ISBN: 978-4-431-55068-6
Online ISBN: 978-4-431-55069-3
eBook Packages: EngineeringEngineering (R0)