{"id":"https://openalex.org/W2768223877","doi":"https://doi.org/10.1109/afrcon.2017.8095705","title":"Software defined wireless sensor networks security challenges","display_name":"Software defined wireless sensor networks security challenges","publication_year":2017,"publication_date":"2017-09-01","ids":{"openalex":"https://openalex.org/W2768223877","doi":"https://doi.org/10.1109/afrcon.2017.8095705","mag":"2768223877"},"language":"en","primary_location":{"id":"doi:10.1109/afrcon.2017.8095705","is_oa":false,"landing_page_url":"https://doi.org/10.1109/afrcon.2017.8095705","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE AFRICON","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5028056274","display_name":"Tebogo Kgogo","orcid":null},"institutions":[{"id":"https://openalex.org/I27765905","display_name":"North-West University","ror":"https://ror.org/010f1sq29","country_code":"ZA","type":"education","lineage":["https://openalex.org/I27765905"]}],"countries":["ZA"],"is_corresponding":true,"raw_author_name":"Tebogo Kgogo","raw_affiliation_strings":["Computer Science Department, North-West University, Mafikeng, South Africa"],"affiliations":[{"raw_affiliation_string":"Computer Science Department, North-West University, Mafikeng, South Africa","institution_ids":["https://openalex.org/I27765905"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041204057","display_name":"Bassey Isong","orcid":"https://orcid.org/0000-0002-3915-4627"},"institutions":[{"id":"https://openalex.org/I27765905","display_name":"North-West University","ror":"https://ror.org/010f1sq29","country_code":"ZA","type":"education","lineage":["https://openalex.org/I27765905"]}],"countries":["ZA"],"is_corresponding":false,"raw_author_name":"Bassey Isong","raw_affiliation_strings":["Computer Science Department, North-West University, Mafikeng, South Africa"],"affiliations":[{"raw_affiliation_string":"Computer Science Department, North-West University, Mafikeng, South Africa","institution_ids":["https://openalex.org/I27765905"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5045534879","display_name":"Adnan M. Abu\u2010Mahfouz","orcid":"https://orcid.org/0000-0002-6413-3924"},"institutions":[{"id":"https://openalex.org/I21360634","display_name":"Council for Scientific and Industrial Research","ror":"https://ror.org/05j00sr48","country_code":"ZA","type":"funder","lineage":["https://openalex.org/I21360634"]}],"countries":["ZA"],"is_corresponding":false,"raw_author_name":"Adnan M. Abu-Mahfouz","raw_affiliation_strings":["Council for Scientific and Industrial Research (CSIR), Meraka Institute, Pretoria, South Africa"],"affiliations":[{"raw_affiliation_string":"Council for Scientific and Industrial Research (CSIR), Meraka Institute, Pretoria, South Africa","institution_ids":["https://openalex.org/I21360634"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5028056274"],"corresponding_institution_ids":["https://openalex.org/I27765905"],"apc_list":null,"apc_paid":null,"fwci":2.2792,"has_fulltext":false,"cited_by_count":27,"citation_normalized_percentile":{"value":0.9013273,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1508","last_page":"1513"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/flexibility","display_name":"Flexibility (engineering)","score":0.6968590021133423},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6913297176361084},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.6855499148368835},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6308983564376831},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5065702199935913},{"id":"https://openalex.org/keywords/software-defined-networking","display_name":"Software-defined networking","score":0.4473850727081299},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.4333823323249817},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3296865224838257},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.22516179084777832}],"concepts":[{"id":"https://openalex.org/C2780598303","wikidata":"https://www.wikidata.org/wiki/Q65921492","display_name":"Flexibility (engineering)","level":2,"score":0.6968590021133423},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6913297176361084},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.6855499148368835},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6308983564376831},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5065702199935913},{"id":"https://openalex.org/C77270119","wikidata":"https://www.wikidata.org/wiki/Q1655198","display_name":"Software-defined networking","level":2,"score":0.4473850727081299},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.4333823323249817},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3296865224838257},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.22516179084777832},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/afrcon.2017.8095705","is_oa":false,"landing_page_url":"https://doi.org/10.1109/afrcon.2017.8095705","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE AFRICON","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6600000262260437,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":49,"referenced_works":["https://openalex.org/W619448039","https://openalex.org/W1652714411","https://openalex.org/W1653252469","https://openalex.org/W1697123834","https://openalex.org/W1752315353","https://openalex.org/W1975936173","https://openalex.org/W1991412044","https://openalex.org/W2010947830","https://openalex.org/W2019191324","https://openalex.org/W2023665096","https://openalex.org/W2040586767","https://openalex.org/W2042810301","https://openalex.org/W2045782914","https://openalex.org/W2048966220","https://openalex.org/W2051152775","https://openalex.org/W2079794025","https://openalex.org/W2087968523","https://openalex.org/W2094656022","https://openalex.org/W2094771060","https://openalex.org/W2131380828","https://openalex.org/W2135105353","https://openalex.org/W2146100293","https://openalex.org/W2148922257","https://openalex.org/W2149690282","https://openalex.org/W2157034822","https://openalex.org/W2158051955","https://openalex.org/W2162910287","https://openalex.org/W2171879066","https://openalex.org/W2183926967","https://openalex.org/W2237633256","https://openalex.org/W2295167007","https://openalex.org/W2352031435","https://openalex.org/W2502812563","https://openalex.org/W2503845840","https://openalex.org/W2509228071","https://openalex.org/W2538554263","https://openalex.org/W2579503083","https://openalex.org/W2586472645","https://openalex.org/W2593921579","https://openalex.org/W2598872017","https://openalex.org/W2610375170","https://openalex.org/W2749723675","https://openalex.org/W2768411980","https://openalex.org/W4244138246","https://openalex.org/W4253647688","https://openalex.org/W6619354513","https://openalex.org/W6637389031","https://openalex.org/W6637804175","https://openalex.org/W6674087999"],"related_works":["https://openalex.org/W4236696095","https://openalex.org/W3143779693","https://openalex.org/W2626808643","https://openalex.org/W2004064826","https://openalex.org/W3103727510","https://openalex.org/W97045569","https://openalex.org/W1527069879","https://openalex.org/W2946179579","https://openalex.org/W2348021072","https://openalex.org/W1871370349"],"abstract_inverted_index":{"Wireless":[0,68],"Sensors":[1],"Networks":[2],"(WSNs)":[3],"have":[4,108],"been":[5,56],"gaining":[6],"significant":[7],"attention":[8],"in":[9,16,123,163],"both":[10,103,124],"the":[11,14,33,82,135,140],"industries":[12],"and":[13,27,55,79,105,115,126,144,152,171,180],"academia":[15],"recent":[17],"years.":[18],"However,":[19,85],"WSN":[20,59,83,106,125,145],"are":[21,30,129],"vulnerable":[22],"to":[23,38,60,75,81,112,131,158,165],"growing":[24],"security":[25,36,44,91,99,121,137],"threats":[26],"attacks":[28,151],"which":[29,107,128],"inept":[31],"for":[32],"current":[34],"traditional":[35],"mechanisms":[37],"cope":[39],"with":[40,58,96],"or":[41,167],"mitigate":[42],"such":[43],"challenges.":[45,92],"As":[46],"a":[47,110,177],"solution,":[48],"Software":[49,66],"Defined":[50,67],"Network":[51,70],"(SDN)":[52],"has":[53],"emerged":[54],"merged":[57],"form":[61],"what":[62],"is":[63,73,87,94,156],"known":[64],"as":[65],"Sensor":[69],"(SDWSN).":[71],"SDWSN":[72,86,93],"introduced":[74],"bring":[76,159],"flexibility,":[77],"programmability":[78],"innovation":[80],"network.":[84],"not":[88],"exempted":[89],"from":[90,102,139],"faced":[95],"multitude":[97],"of":[98,142],"challenges":[100,122,138,162],"inherited":[101],"SDN":[104,127,143],"become":[109],"bottle-neck":[111],"its":[113],"operations":[114],"applicability.":[116],"Therefore,":[117],"this":[118],"paper":[119],"presents":[120],"transferable":[130],"SDWSN.":[132,182],"We":[133],"discussed":[134],"inheritable":[136],"perspective":[141],"by":[146],"outlining":[147],"several":[148],"possible":[149],"threats,":[150],"some":[153],"countermeasures.":[154],"This":[155],"important":[157],"together":[160],"these":[161],"order":[164],"attract":[166],"stimulate":[168],"more":[169,178],"research":[170],"development":[172],"activities":[173],"aim":[174],"at":[175],"realizing":[176],"secure":[179],"dependable":[181]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":8},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":8}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
