Security in wireless sensor networks

被引:748
|
作者
Perrig, A [1 ]
Stankovic, J
Wagner, D
机构
[1] Carnegie Mellon Univ, Pittsburgh, PA 15213 USA
[2] Univ Virginia, Dept Comp Sci, Charlottesville, VA 22903 USA
[3] Univ Calif Berkeley, Berkeley, CA 94720 USA
关键词
D O I
10.1145/990680.990707
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The various aspects of security in wireless sensor networks are discussed. The wireless networks are susceptible to a variety of attacks, including node capture, physical tampering, and denial of service. Security is viewed as a standalone component of a system's architecture, where a separate module provides security. Many applications are likely to involve the deployment of sensor networks under a single administrative domain, simplifying the threat model.
引用
收藏
页码:53 / 57
页数:5
相关论文
共 50 条
  • [41] Evaluation of security mechanisms in wireless sensor networks
    Guimaraes, G
    Souto, E
    Sadok, D
    Kelner, J
    [J]. 2005 SYSTEMS COMMUNICATIONS, PROCEEDINGS: ICW 2005, WIRELESS TECHNOLOGIES; ICHSN 2005, HIGH SPEED NETWORKS; ICMCS 2005, MULTIMEDIA COMMUNICATIONS SYSTEMS; SENET 2005, SENSOR NETWORKS, 2005, : 428 - 433
  • [42] Security management in Wireless Sensor Networks for healthcare
    Oh, Tae
    Choi, Young B.
    Ryoo, Jungwoo
    Stokes, Kristian
    [J]. INTERNATIONAL JOURNAL OF MOBILE COMMUNICATIONS, 2011, 9 (02) : 187 - 207
  • [43] Security of Industrial Wireless Sensor Networks : A Review
    Sheela, S. J.
    Suresh, K., V
    Tandur, Deepaknath
    [J]. 2015 INTERNATIONAL CONFERENCE ON TRENDS IN AUTOMATION, COMMUNICATIONS AND COMPUTING TECHNOLOGY (I-TACT-15), 2015,
  • [44] A Security Localization method in wireless sensor networks
    Xue-dong, Chen
    Bao, Peng
    [J]. NEW TRENDS AND APPLICATIONS OF COMPUTER-AIDED MATERIAL AND ENGINEERING, 2011, 186 : 193 - +
  • [45] A New Security Scheme for Wireless Sensor Networks
    Zhang, Junqi
    Varadharajan, Vijay
    [J]. GLOBECOM 2008 - 2008 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2008,
  • [46] Wireless Sensor Networks Security: Case study
    Alfaleh, Faleh
    Alfehaid, Haitham
    Alanzy, Mohammed
    Elkhediri, Salim
    [J]. 2019 2ND INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS), 2019,
  • [47] Forum session: Security for wireless sensor networks
    Carman, D
    Swarup, V
    Coffin, D
    Watro, R
    Dutertre, B
    [J]. 19TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2003, : 106 - 107
  • [48] Security in Wireless Sensor Networks using ECC
    Saqib, Najmus
    Iqbal, Ummer
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER APPLICATIONS (ICACA), 2016, : 270 - 274
  • [49] Security Architecture and Requirements for Wireless Sensor Networks
    Gong, Yiguang
    Ruan, Feng
    Fan, Zhiyong
    Hou, Jianmin
    Mei, Ping
    Li, Tao
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (08): : 295 - 302
  • [50] Enhanced Security Protocol in Wireless Sensor Networks
    Aseri, T. C.
    Singla, N.
    [J]. INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, 2011, 6 (02) : 214 - 221