earticle

논문검색

Security Architecture and Requirements for Wireless Sensor Networks

초록

영어

Recently, with the wider application and development of wireless sensor networks (WSNs), security issues become essential for many sensor network applications including environment monitoring, traffic controlling, military sensing, patient status monitoring and so on. In this paper, we summarize the security architecture and requirements, enumerate attacks and countermeasures in wireless sensor networks. In addition, we also summarize key management and introduce several typical key management methods. Which benefit researchers greatly to realizing the situation and trend of state-of-the-art of wireless sensor networks security.

목차

Abstract
 1. Introduction
 2. Security Architecture and Requirement
  2.1. Security Architecture
  2.2. Security Requirements
 3. Attack and Defense
  3.1. Attacks in Wireless Sensor Network
  3.2. Attack Defenses in Wireless Sensor Network
 4. Key Management
  4.1. Basic Key Distribution Scheme
  4.2. q-composite Random Key Pre-distribution Scheme
  4.3. Random Seed Key Distribution Scheme
 5. Summary
 Acknowledgements
 References

저자정보

  • Yiguang Gong School of Information & Control, Nanjing University of Information Science & Technology, Nanjing, China
  • Feng Ruan School of Information & Control, Nanjing University of Information Science & Technology, Nanjing, China
  • Zhiyong Fan School of Information & Control, Nanjing University of Information Science & Technology, Nanjing, China
  • Jianmin Hou School of Information & Control, Nanjing University of Information Science & Technology, Nanjing, China
  • Ping Mei School of Information & Control, Nanjing University of Information Science & Technology, Nanjing, China
  • Tao Li School of Electronic & Information Engineering, Nanjing University of Information Science & Technology, Nanjing, China

참고문헌

자료제공 : 네이버학술정보

    함께 이용한 논문

      ※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

      0개의 논문이 장바구니에 담겼습니다.