Affiliation:
1. Nanchang Hangkong University
Abstract
With the wide application of wireless sensor networks, their securities become research hotspot. Firstly, introduced the limiting factors of wireless sensor networks, summarized the security attack types and gave prevention strategies accordingly. Secondly, proposed the security technologies of wireless sensor networks, these technologies include key management and distribution, authentication and verification, and data fusion encryption technologies. Finally, discussed further security research interests.
Publisher
Trans Tech Publications, Ltd.
Reference12 articles.
1. HUI LI. Study on the Security of Wireless Sensor Network. Shanghai Jiaotong University (2007).
2. B. LAI S K, AND I. VERBAUWHEDE. Scalable session key construction protocol for wireless sensor networks. In IEEE Workshop on Large Scale RealTime and Embedded Systems(LARTES), Austin, Texas(2002).
3. V. GLIGOR L E A. A Key Management Scheme for Distributed Sensor Networks. In ACM CCS, Washington DC(2002).
4. NING D L A P. Location-based pairwise key establishment for static sensor networks. In 1st ACM Workshop on Security of Ad Hoc and Sensor Networks(2003).
5. C. BLUNDO A S, A. HERZBERG, AND S. KUTTEN. Perfectly-secure key distribution for dynamic conferences. In Crypto 92(1992).
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献