dc.contributor.author | Karakaya, Aykut | |
dc.contributor.author | Akleylek, Sedat | |
dc.date.accessioned | 2020-06-21T13:13:18Z | |
dc.date.available | 2020-06-21T13:13:18Z | |
dc.date.issued | 2018 | |
dc.identifier.isbn | 978-1-5386-3449-3 | |
dc.identifier.uri | https://hdl.handle.net/20.500.12712/11988 | |
dc.description | 6th International Symposium on Digital Forensic and Security (ISDFS) -- MAR 22-25, 2018 -- Antalya, TURKEY | en_US |
dc.description | Akleylek, Sedat/0000-0001-7005-6489; | en_US |
dc.description | WOS: 000434247400068 | en_US |
dc.description.abstract | Wireless sensor networks (WSN) are networks in which data obtained by observing the environment by a large number of sensors deployed in a specific area are sent securely to other sensors or centers in the network These networks have the abilities of being not connected to a central node, self-managing and healing, not being connected to a specific network topology, multi-way routing, preserving the integrity and confidentiality of data, and being robust. Today's ongoing work: designing sensors that are resistant to harsh weather conditions, reducing energy consumption, designing low-cost sensors with high capacities, and making data flow faster and safer. The data obtained from the sensors must be transmitted safely to the target. Wireless sensor networks have a large number of attack types (Sybil, Wormhole, Sinkhole, etc.) that threaten data flow. While designing security policies, a general structure is aimed at eliminating some or all of the attacks. For this reason, policies based on information security principles such as privacy, integrity, availability, authentication and non repudiation have been developed. In this paper, current problems are assessed in the security of Wireless sensor networks, and authentication security policies are discussed. | en_US |
dc.description.sponsorship | IEEE Turkey Sect, Firat Univ, Sam Houston State Univ, Gazi Univ, Univ Arkanas Little Rock, Polytechn Inst Cavado & Ave, Havelsan, Balikesir Univ, Hacettepe Univ, Youngstown State Univ, Baskent Univ, Petru Maior Univ | en_US |
dc.description.sponsorship | OMUOndokuz Mayis University [PYO.MUH.1906.17.003] | en_US |
dc.description.sponsorship | This research is partially supported by OMU under grant no. PYO.MUH.1906.17.003. | en_US |
dc.language.iso | eng | en_US |
dc.publisher | Ieee | en_US |
dc.rights | info:eu-repo/semantics/closedAccess | en_US |
dc.subject | Wireless Sensor Networks | en_US |
dc.subject | WSN Security | en_US |
dc.subject | Authentication Protocols | en_US |
dc.title | A Survey on Security Threats and Authentication Approaches in Wireless Sensor Networks | en_US |
dc.type | conferenceObject | en_US |
dc.contributor.department | OMÜ | en_US |
dc.identifier.startpage | 359 | en_US |
dc.identifier.endpage | 362 | en_US |
dc.relation.journal | 2018 6Th International Symposium on Digital Forensic and Security (Isdfs) | en_US |
dc.relation.publicationcategory | Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı | en_US |