Publication: A Survey on Security Threats and Authentication Approaches in Wireless Sensor Networks
| dc.authorscopusid | 57214011617 | |
| dc.authorscopusid | 15833929800 | |
| dc.contributor.author | Karakaya, A. | |
| dc.contributor.author | Akleylek, S. | |
| dc.date.accessioned | 2020-06-21T13:13:18Z | |
| dc.date.available | 2020-06-21T13:13:18Z | |
| dc.date.issued | 2018 | |
| dc.department | Ondokuz Mayıs Üniversitesi | en_US |
| dc.department-temp | [Karakaya] Aykut, Department of Computer Engineering, Zonguldak Bulent Ecevit University, Zonguldak, Zonguldak, Turkey; [Akleylek] Sedat, Department of Computer Engineering, Ondokuz Mayis Üniversitesi, Samsun, Turkey | en_US |
| dc.description | IEEE Society | en_US |
| dc.description.abstract | Wireless sensor networks (WSN) are networks in which data obtained by observing the environment by a large number of sensors deployed in a specific area are sent securely to other sensors or centers in the network. These networks have the abilities of being not connected to a central node, self-managing and healing, not being connected to a specific network topology, multi-way routing, preserving the integrity and confidentiality of data, and being robust. Today's ongoing work: designing sensors that are resistant to harsh weather conditions, reducing energy consumption, designing low-cost sensors with high capacities, and making data flow faster and safer. The data obtained from the sensors must be transmitted safely to the target. Wireless sensor networks have a large number of attack types (Sybil, Wormhole, Sinkhole, etc.) that threaten data flow. While designing security policies, a general structure is aimed at eliminating some or all of the attacks. For this reason, policies based on information security principles such as privacy, integrity, availability, authentication and non-repudiation have been developed. In this paper, current problems are assessed in the security of wireless sensor networks, and authentication security policies are discussed. © 2018 IEEE. | en_US |
| dc.identifier.doi | 10.1109/ISDFS.2018.8355381 | |
| dc.identifier.endpage | 4 | en_US |
| dc.identifier.isbn | 9781538634493 | |
| dc.identifier.scopus | 2-s2.0-85050959146 | |
| dc.identifier.startpage | 1 | en_US |
| dc.identifier.uri | https://doi.org/10.1109/ISDFS.2018.8355381 | |
| dc.identifier.wos | WOS:000434247400068 | |
| dc.language.iso | en | en_US |
| dc.publisher | Institute of Electrical and Electronics Engineers Inc. | en_US |
| dc.relation.ispartof | -- 6th International Symposium on Digital Forensic and Security, ISDFS 2018 -- 2018-03-22 through 2018-03-25 -- Antalya -- 136277 | en_US |
| dc.relation.journal | 2018 6Th International Symposium on Digital Forensic and Security (Isdfs) | en_US |
| dc.relation.publicationcategory | Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı | en_US |
| dc.rights | info:eu-repo/semantics/closedAccess | en_US |
| dc.subject | Authentication Protocols | en_US |
| dc.subject | Wireless Sensor Networks | en_US |
| dc.subject | WSN Security | en_US |
| dc.title | A Survey on Security Threats and Authentication Approaches in Wireless Sensor Networks | en_US |
| dc.type | Conference Object | en_US |
| dspace.entity.type | Publication |
