Problems and Solutions on Security of Wireless Sensor Network in Facilities on Sports Venues

Article Preview

Abstract:

Security issue of sensor networks is greatly different from that of conventional networks. In this paper, the characteristics analysis of wireless sensor network (WSN) has been carried out firstly, through analysis, the security architecture of sensor networks is proposed, trying to outline a general illustration on this area, and then security defense on the wireless sensor network security issues has been implemented secondly, finally the pairwise keying algorithm has been described and analyzed ,from above all, the ultimate security solution of wireless sensor network has been proposed.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

195-198

Citation:

Online since:

July 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Perrig A, Szewczyk R, Wen V, Culler D, Tygar JD. SPINS: Security protocols for sensor networks. In: Proc. of the 7th Annual Int'l Conf. on Mobile Computing and Networks. Rome: ACM Press, 2001. 189−199.

DOI: 10.1145/381677.381696

Google Scholar

[2] Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E. Wireless sensor networks: A survey. Computer Networks, 2002,38(4):393−422.

DOI: 10.1016/s1389-1286(01)00302-4

Google Scholar

[3] Zhu S, Setia S, Jajodia S. LEAP: Efficient security mechanisms for large-scale distributed sensor networks. In: Proc. of the 10th ACM Conf. on Computer and Communications Security (CCS 2003). Washington D.C., 2003. 62−72.

DOI: 10.1145/948109.948120

Google Scholar

[4] J. Deng, R. Han, S. Mishra, Defending against path-based DoS attacks in wireless sensor networks, in: Proc. ACM Workshop on Security of Ad Hoc and Sensor Networks SASN-2005, 2005, 89–96.

DOI: 10.1145/1102219.1102235

Google Scholar

[5] M. Manzo, T. Roosta, Time synchronization attacks in sensor networks, in: Proc. ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2005), 2005, p.107–116.

DOI: 10.1145/1102219.1102238

Google Scholar

[6] Zhang W, Cao G. Group rekeying for filtering false data in sensor networks: A predistribution and local collaboration-basedapproach. http://www.cse.psu.edu/~wezhang/papers/paper-infocom05.pdf

DOI: 10.1109/infcom.2005.1497918

Google Scholar

[7] Malan DJ, Welsh M, Smith MD. A public-key infrastructure for key distribution in Ting OS based on elliptic curve cryptography.http://airclic.eecs.harvard.edu/publications/secon04.pdf

DOI: 10.1109/sahcn.2004.1381904

Google Scholar

[8] Chan H, Perrig A, Song D. Random key predistribution schemes for sensor networks. In: Proc. of the IEEE Symp. on Research in Security and Privacy. Oakland: IEEE Computer Society, 2003. 197−213.

Google Scholar

[9] Du WL, Wang RH, Ning P. An efficient scheme for authenticating public keys in sensor networks. In: Proc. of the 6th ACM Int'l Symp. on Mobile Ad Hoc Networking and Computing (MobiHoc 2005). Urbana-Champaign: ACM Press, 2005. 58−67.

DOI: 10.1145/1062689.1062698

Google Scholar

[10] Eschenauer L, Gligor VD. A key-management scheme for distributed sensor networks. In: Proc. of the 9th ACM Conf. onComputer and Communications Security. Washington DC: ACM Press, 2002. 41−47.

DOI: 10.1145/586110.586117

Google Scholar

[11] A.Chadha, Y. Liu, S.K. v, Group key distribution via local collaboration in wireless sensor networks, in: Proc. IEEE SECON 05, 2005, 46–54.

DOI: 10.1109/sahcn.2005.1556863

Google Scholar