Publication:
A Survey on Security Threats and Authentication Approaches in Wireless Sensor Networks

dc.authorscopusid57214011617
dc.authorscopusid15833929800
dc.contributor.authorKarakaya, A.
dc.contributor.authorAkleylek, S.
dc.date.accessioned2020-06-21T13:13:18Z
dc.date.available2020-06-21T13:13:18Z
dc.date.issued2018
dc.departmentOndokuz Mayıs Üniversitesien_US
dc.department-temp[Karakaya] Aykut, Department of Computer Engineering, Zonguldak Bulent Ecevit University, Zonguldak, Zonguldak, Turkey; [Akleylek] Sedat, Department of Computer Engineering, Ondokuz Mayis Üniversitesi, Samsun, Turkeyen_US
dc.descriptionIEEE Societyen_US
dc.description.abstractWireless sensor networks (WSN) are networks in which data obtained by observing the environment by a large number of sensors deployed in a specific area are sent securely to other sensors or centers in the network. These networks have the abilities of being not connected to a central node, self-managing and healing, not being connected to a specific network topology, multi-way routing, preserving the integrity and confidentiality of data, and being robust. Today's ongoing work: designing sensors that are resistant to harsh weather conditions, reducing energy consumption, designing low-cost sensors with high capacities, and making data flow faster and safer. The data obtained from the sensors must be transmitted safely to the target. Wireless sensor networks have a large number of attack types (Sybil, Wormhole, Sinkhole, etc.) that threaten data flow. While designing security policies, a general structure is aimed at eliminating some or all of the attacks. For this reason, policies based on information security principles such as privacy, integrity, availability, authentication and non-repudiation have been developed. In this paper, current problems are assessed in the security of wireless sensor networks, and authentication security policies are discussed. © 2018 IEEE.en_US
dc.identifier.doi10.1109/ISDFS.2018.8355381
dc.identifier.endpage4en_US
dc.identifier.isbn9781538634493
dc.identifier.scopus2-s2.0-85050959146
dc.identifier.startpage1en_US
dc.identifier.urihttps://doi.org/10.1109/ISDFS.2018.8355381
dc.identifier.wosWOS:000434247400068
dc.language.isoenen_US
dc.publisherInstitute of Electrical and Electronics Engineers Inc.en_US
dc.relation.ispartof-- 6th International Symposium on Digital Forensic and Security, ISDFS 2018 -- 2018-03-22 through 2018-03-25 -- Antalya -- 136277en_US
dc.relation.journal2018 6Th International Symposium on Digital Forensic and Security (Isdfs)en_US
dc.relation.publicationcategoryKonferans Öğesi - Uluslararası - Kurum Öğretim Elemanıen_US
dc.rightsinfo:eu-repo/semantics/closedAccessen_US
dc.subjectAuthentication Protocolsen_US
dc.subjectWireless Sensor Networksen_US
dc.subjectWSN Securityen_US
dc.titleA Survey on Security Threats and Authentication Approaches in Wireless Sensor Networksen_US
dc.typeConference Objecten_US
dspace.entity.typePublication

Files