Online citations, reference lists, and bibliographies.
← Back to Search

A Brief Survey Of Access Control In Wireless Sensor Networks

I. Butun, R. Sankar
Published 2011 · Computer Science

Cite This
Download PDF
Analyze on Scholarcy
Share
In this paper, we investigate applications of access control to Wireless Sensor Networks (WSNs). Although access control was well established for traditional computer systems, it has not been studied thoroughly in WSN environments. We briefly provide the WSN specifications and then stress the constraints of the WSNs that would affect the access control implementation. We also provide a literature overview and discuss further possible solutions.
This paper references



This paper is referenced by
EIDA: An Energy-Intrusion aware Data Aggregation Technique for Wireless Sensor Networks
Nafiseh Daneshgar (2016)
10.1109/SURV.2013.050113.00191
A Survey of Intrusion Detection Systems in Wireless Sensor Networks
I. Butun (2014)
10.1109/EIC.2015.7230703
NS-2 implementation and comparison of ENABLE and HBQ protocol of access control scheme based on ECC for WSN security
B PatilSanketa (2015)
10.1007/s10586-017-0863-y
A fine-grained and lightweight data access control scheme for WSN-integrated cloud computing
Heng He (2017)
10.1007/978-981-10-3433-6_65
A Comprehensive Survey on Intrusion Detection Systems in Wireless Sensor Network
A. Dhakne (2016)
Hardware-Backed Identity Management Systems
Jan Vossaert (2014)
10.1109/HPCC-CSS-ICESS.2015.283
MPOID: Multi-protocol Oriented Intrusion Detection Method for Wireless Sensor Networks
Q. Guo (2015)
10.1109/IADCC.2015.7154753
An hybrid secure scheme for secure transmission in grid based Wireless Sensor Network
C. Manjunath (2015)
10.1016/J.AASRI.2013.10.053
A Location Temporal based Access Control Model for IoTs
C. Lee (2013)
10.5815/IJMECS.2017.11.06
Modeling the effect of Network Access Control and Sensor Random Distribution on Worm Propagation
ChukwuNonso H. Nwokoye (2017)
10.1007/978-3-319-26450-9_24
A Review of the Use of Computational Intelligence in the Design of Military Surveillance Networks
M. G. Ball (2016)
HIDES: Hierarchical based and an Energy Efficient Intrusion Detection System for Wireless Sensor Networks
B Kamaladharan (2015)
10.1007/S11276-014-0858-Z
Anomaly detection and foresight response strategy for wireless sensor networks
Mohammad Ghasemigol (2015)
10.1016/j.future.2016.06.010
MP-MID: Multi-Protocol Oriented Middleware-level Intrusion Detection method for wireless sensor networks
Q. Guo (2017)
Prevention and detection of intrusions in wireless sensor networks
R. Sankar (2013)
10.1016/j.vehcom.2018.04.005
A survey on Intrusion Detection Systems and Honeypot based proactive security mechanisms in VANETs and VANET Cloud
Sparsh Sharma (2018)
Semantic Scholar Logo Some data provided by SemanticScholar