Recent advances in attacks, technical challenges, vulnerabilities and their countermeasures in wireless sensor networks

B Bhushan, G Sahoo - Wireless Personal Communications, 2018‏ - Springer
Advances in hardware manufacturing technology, wireless communications, micro electro-
mechanical devices and information processing technologies enabled the development of …

Sensor network security: a survey

X Chen, K Makki, K Yen… - … surveys & tutorials, 2009‏ - ieeexplore.ieee.org
Wireless sensor networks (WSNs) use small nodes with constrained capabilities to sense,
collect, and disseminate information in many types of applications. As sensor networks …

Seda: Scalable embedded device attestation

N Asokan, F Brasser, A Ibrahim, AR Sadeghi… - Proceedings of the …, 2015‏ - dl.acm.org
Today, large numbers of smart interconnected devices provide safety and security critical
services for energy grids, industrial control systems, gas and oil search robots, home/office …

Distributed detection of node replication attacks in sensor networks

B Parno, A Perrig, V Gligor - … on security and privacy (S&P'05), 2005‏ - ieeexplore.ieee.org
The low-cost, off-the-shelf hardware components in unshielded sensor-network nodes leave
them vulnerable to compromise. With little effort, an adversary may capture nodes, analyze …

Markov decision processes with applications in wireless sensor networks: A survey

MA Alsheikh, DT Hoang, D Niyato… - … Surveys & Tutorials, 2015‏ - ieeexplore.ieee.org
Wireless sensor networks (WSNs) consist of autonomous and resource-limited devices. The
devices cooperate to monitor one or more physical phenomena within an area of interest …

Securing wireless sensor networks: a survey

Y Zhou, Y Fang, Y Zhang - IEEE Communications Surveys & …, 2008‏ - ieeexplore.ieee.org
The significant advances of hardware manufacturing technology and the development of
efficient software algorithms make technically and economically feasible a network …

Game theory for wireless sensor networks: a survey

HY Shi, WL Wang, NM Kwok, SY Chen - Sensors, 2012‏ - mdpi.com
Game theory (GT) is a mathematical method that describes the phenomenon of conflict and
cooperation between intelligent rational decision-makers. In particular, the theory has been …

SDAP: A secure hop-by-hop data aggregation protocol for sensor networks

Y Yang, X Wang, S Zhu, G Cao - ACM Transactions on Information and …, 2008‏ - dl.acm.org
Hop-by-hop data aggregation is a very important technique for reducing the communication
overhead and energy expenditure of sensor nodes during the process of data collection in a …

Optimal jamming attacks and network defense policies in wireless sensor networks

M Li, I Koutsopoulos… - IEEE INFOCOM 2007-26th …, 2007‏ - ieeexplore.ieee.org
We consider a scenario where a sophisticated jammer jams an area in a single-channel
wireless sensor network. The jammer controls the probability of jamming and transmission …

Detecting selective forwarding attacks in wireless sensor networks

B Yu, B **ao - Proceedings 20th IEEE international parallel & …, 2006‏ - ieeexplore.ieee.org
Selective forwarding attacks may corrupt some mission-critical applications such as military
surveillance and forest fire monitoring. In these attacks, malicious nodes behave like normal …