원문정보
보안공학연구지원센터(IJSIA)
International Journal of Security and Its Applications
Vol.10 No.8
2016.08
pp.295-302
피인용수 : 0건 (자료제공 : 네이버학술정보)
초록
영어
Recently, with the wider application and development of wireless sensor networks (WSNs), security issues become essential for many sensor network applications including environment monitoring, traffic controlling, military sensing, patient status monitoring and so on. In this paper, we summarize the security architecture and requirements, enumerate attacks and countermeasures in wireless sensor networks. In addition, we also summarize key management and introduce several typical key management methods. Which benefit researchers greatly to realizing the situation and trend of state-of-the-art of wireless sensor networks security.
목차
Abstract
1. Introduction
2. Security Architecture and Requirement
2.1. Security Architecture
2.2. Security Requirements
3. Attack and Defense
3.1. Attacks in Wireless Sensor Network
3.2. Attack Defenses in Wireless Sensor Network
4. Key Management
4.1. Basic Key Distribution Scheme
4.2. q-composite Random Key Pre-distribution Scheme
4.3. Random Seed Key Distribution Scheme
5. Summary
Acknowledgements
References
1. Introduction
2. Security Architecture and Requirement
2.1. Security Architecture
2.2. Security Requirements
3. Attack and Defense
3.1. Attacks in Wireless Sensor Network
3.2. Attack Defenses in Wireless Sensor Network
4. Key Management
4.1. Basic Key Distribution Scheme
4.2. q-composite Random Key Pre-distribution Scheme
4.3. Random Seed Key Distribution Scheme
5. Summary
Acknowledgements
References
저자정보
참고문헌
자료제공 : 네이버학술정보
