Hardware Security in Sensor and its Networks

نویسندگان

چکیده

Sensor networks and IoT systems have been widely deployed in monitoring controlling system. With its increasing utilization, the functionality performance of sensor their applications are not only design aims; security issues attract more attentions. Security threats could be originated from various sectors: users cyber space, security-weak protocols, obsolete network infrastructure, low-end physical devices, global supply chain. In this work, we take one emerging applications, advanced manufacturing, as an example to analyze challenges network. Presentable attacks—hardware Trojan attack, man-in-the-middle jamming attack replay attack—are examined context sensing nodes a long-range wide-area (LoRaWAN) for manufacturing. Moreover, detecting those attacks.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security in Sensor Networks

In this chapter, we consider the networks compliant with the recent IEEE 802.15.4 standard and describe a number of possible attacks at the MAC layer. Several of these attacks can be easily launched with devices that are fully compliant with the 802.15.4 standard, and we show that such attacks can introduce serious disruption. We also discuss some remedial measures that may help defend against ...

متن کامل

A Lightweight Intrusion Detection System Based on Specifications to Improve Security in Wireless Sensor Networks

Due to the prevalence of Wireless Sensor Networks (WSNs) in the many mission-critical applications such as military areas, security has been considered as one of the essential parameters in Quality of Service (QoS), and Intrusion Detection System (IDS) is considered as a fundamental requirement for security in these networks. This paper presents a lightweight Intrusion Detection System to prote...

متن کامل

Security in Wireless Sensor Networks

Wireless sensor networks (WSNs) have attracted a lot of interest over the last decade in wireless and mobile computing research community. Applications of WSNs are numerous and growing, which range from indoor deployment scenarios in the home and office to outdoor deployment in adversary’s territory in a tactical battleground. However, due to distributed nature and their deployment in remote ar...

متن کامل

Wireless Sensor Networks: An Overview on its Security Threats

Wireless sensor networks have become a growing area of research and development due to the tremendous number of applications that can greatly benefit from such systems and has lead to the development of tiny, cheap, disposable and self contained battery powered computers, known as sensor nodes or “motes”, which can accept input from an attached sensor, process this input data and transmit the r...

متن کامل

Hardware Assisted Compression in Wireless Sensor Networks

A wireless sensor network (WSN) is comprised of resource constrained devices called motes. Motes are battery operated and must conserve as much power as possible. Power usage for each mote is made up of processing data, sensing the surroundings, and sending and receiving packets. The bulk of power usage for standard WSN applications lies in the radio where receiving and sending packets are nece...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Frontiers in sensors

سال: 2022

ISSN: ['2673-5067']

DOI: https://doi.org/10.3389/fsens.2022.850056