About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Cognitive Computing and Cyber Physical Systems. 5th EAI International Conference, IC4S 2024, Bhimavaram, India, April 5–7, 2024, Proceedings, Part-I

Research Article

Defense Strategy Security Mechanism for Sensor Networks

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-031-77075-3_5,
        author={Rakesh Nayak and Jitesh Shinde and Praveen Gupta and Satyabrata Dash and Umashankar Ghugar and Lokendra Singh},
        title={Defense Strategy Security Mechanism for Sensor Networks},
        proceedings={Cognitive Computing and Cyber Physical Systems. 5th EAI International Conference, IC4S 2024, Bhimavaram, India, April 5--7, 2024, Proceedings, Part-I},
        proceedings_a={IC4S},
        year={2025},
        month={2},
        keywords={Sensor Network Security Mechanism Vulnerabilities Intrusion Detection},
        doi={10.1007/978-3-031-77075-3_5}
    }
    
  • Rakesh Nayak
    Jitesh Shinde
    Praveen Gupta
    Satyabrata Dash
    Umashankar Ghugar
    Lokendra Singh
    Year: 2025
    Defense Strategy Security Mechanism for Sensor Networks
    IC4S
    Springer
    DOI: 10.1007/978-3-031-77075-3_5
Rakesh Nayak1,*, Jitesh Shinde2, Praveen Gupta3, Satyabrata Dash4, Umashankar Ghugar1, Lokendra Singh5
  • 1: Department of CSE
  • 2: Department of Electronics Engineering (VLSI Design and Technology), CSMSS Chh Shahu College of Engineering
  • 3: Department of Computer Science and Engineering
  • 4: Department of Computer Science and Engineering GITAM School of Technology
  • 5: Department of Electronics and Communication Engineering, Graphic Era (Deemed to be University)
*Contact email: nayakrakesh8@gmail.com

Abstract

This paper examines the safety measures used in sensing unit networks, focusing on their effectiveness in securing critical applications from threats like unapproved access, information violations, and meddling. It assesses the current state of these devices, identifies their weaknesses and strengths, and identifies obstacles such as source restrictions, scalability, and ease of access to risks. The paper emphasizes the importance of cooperation and data sharing among countries in reinforcing protection technique safety devices. The review concludes with a call to action, emphasizing the need for continuous research, innovation, and policy frameworks to address the evolving security landscape and protect critical infrastructure.

Keywords
Sensor Network Security Mechanism Vulnerabilities Intrusion Detection
Published
2025-02-09
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-031-77075-3_5
Copyright © 2024–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL