Wireless Sensor Networks Security Issues as Smart Materials Systems

Article Preview

Abstract:

With the wide application of wireless sensor networks, their securities become research hotspot. Firstly, introduced the limiting factors of wireless sensor networks, summarized the security attack types and gave prevention strategies accordingly. Secondly, proposed the security technologies of wireless sensor networks, these technologies include key management and distribution, authentication and verification, and data fusion encryption technologies. Finally, discussed further security research interests.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

497-501

Citation:

Online since:

June 2011

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] HUI LI. Study on the Security of Wireless Sensor Network. Shanghai Jiaotong University (2007).

Google Scholar

[2] B. LAI S K, AND I. VERBAUWHEDE. Scalable session key construction protocol for wireless sensor networks. In IEEE Workshop on Large Scale RealTime and Embedded Systems(LARTES), Austin, Texas(2002).

Google Scholar

[3] V.GLIGOR L E A. A Key Management Scheme for Distributed Sensor Networks. In ACM CCS, Washington DC(2002).

Google Scholar

[4] NING D L A P. Location-based pairwise key establishment for static sensor networks. In 1st ACM Workshop on Security of Ad Hoc and Sensor Networks(2003).

DOI: 10.1145/986858.986869

Google Scholar

[5] C. BLUNDO A S, A. HERZBERG, AND S. KUTTEN. Perfectly-secure key distribution for dynamic conferences. In Crypto 92(1992).

DOI: 10.1007/3-540-48071-4_33

Google Scholar

[6] A. MAHIMKAR T S R. SecureDAV: A Secure Data Aggregation and Verification Protocol for Sensor Networks. Proceedings of IEEE Global Telecommunications Conference(Globecom), Dallas, TX, USA(2004).

DOI: 10.1109/glocom.2004.1378395

Google Scholar

[7] C. CASTELLUCCIA E M A G T. Efficient Aggregation of Encrypted Data in Wireless Sensor Networks. ACM/IEEE Mobiquitous Conference, San Diego, USA(2005).

Google Scholar

[8] E. MYKLTUN J G A D W. Public key based cryptoschemes for data concealment in wireless sensor networks. In IEEE International Conference on Communications, Turkey(2006).

DOI: 10.1109/icc.2006.255111

Google Scholar

[9] PEI Q Q, SHEN Y L, MA J F. Survey of Wireless Sensor Networks Seurity Techniques. Journal on Communications. Vol. 08(2007), pp.113-122.

Google Scholar

[10] CASTELLUCCIA C, CHAN A C F, MYKLETUN E, et al. Efficient and Provably Secure Aggregation of Encrypted Data in Wireless Sensor Networks [J]. Acm Transcations on Sensor Networks, Vol. 5(2009), pp.1-36.

DOI: 10.1145/1525856.1525858

Google Scholar

[11] OZDEMIR S, XIAO Y. Secure data aggregation in wireless sensor networks: A comprehensive overview. Computer Network, Vol. 53(2009), pp.2022-2037.

DOI: 10.1016/j.comnet.2009.02.023

Google Scholar

[12] WU K, DREEF D, SUN B, et al. Secure data aggregation without persistent cryptographic operations in wireless sensor networks. Ad Hoc Network, Vol. 5(2007), pp.100-111

DOI: 10.1016/j.adhoc.2006.05.009

Google Scholar