期刊文献+

无线传感器网络安全研究综述 被引量:11

Survey of security technologies on wireless sensor networks
下载PDF
导出
摘要 无线传感器网络作为后PC时代实现信息收集、传输与处理的重要技术,在军事和民用领域均有广泛的潜在用途,是当前技术研究的热点。无线传感器网络因其资源有限和分布与通信开放性的特点而使得其安全性需求显得极为重要和必要。本文从无线传感器网络的安全挑战、安全需求、可能受到的安全攻击及相应的防御方法等方面对目前国内外开展的研究进行了较系统的总结,有助于了解当前无线传感器网络安全研究进展及现状。 As an important technique used in collecting,transferring and processing information in the post-PC era,wireless sensor network(WSN),which is a hot researching technology,will be wide-spread deployed in both military and civilian applications.WSN does the need for effective security because of its inherent resource constraints and open deployment and radio.The state-of-the-art of WSN security is summarized including security challenges,security demands,possible security attacks and their countermeasures.This will benefit researchers greatly to familiarizing with the current research and its trend in the field.
出处 《仪器仪表学报》 EI CAS CSCD 北大核心 2006年第z1期307-311,共5页 Chinese Journal of Scientific Instrument
基金 重庆市教委科技研究(040510)资助项目
关键词 无线传感器网络 安全 进展 wireless sensor network(WSN) security advance
  • 相关文献

参考文献21

  • 1[1]任新辉,等.无线传感器网络的通信安全[EB/OL].http://mntrc.nuc.edu.cn/editor/UploadFile/2005101715343966.pdf.2006,2-2.
  • 2[3]Hartung C.Node compromise in sensor networks:the need for secure systems[R].Technical report CU-CS-988-04,University of Colorado at Boulder,2004.
  • 3[4]Chris Karlof and David Wagner.Secure routing in wireless sensor networks:attacks and countermeasures[C].Proceedings of first IEEE international workshop on sensor network protocols and applications,May 2003.
  • 4[5]John Paul Walters.Wireless sensor network security:asurvey[EB/OL].http://wwwedit.cs.wayne.edu/weisong/papers/walters05-wsn-security-survey.pdf,2006-2-7.
  • 5[6]Newsome J.The sybil attack in sensor networks:analysis & defense[C].Proceedings of the third international symposium on information proceeding in sensor networks.ACM press,2004:259-268.
  • 6[7]Fei Hu and et al.Secure wireless sensor networks:problems and solutions[EB/OL].http://cs.uiowa.edu/-kghoshda/rs/security/hu.pdf,2006-2-7.
  • 7[8]Zhu Sencun.LEAP:efficient security mechanisms for large-scale distributed sensor networks[C].In the proceedings of the 10th ACM conference on computer and communications security,Oct.,2003:62-72.
  • 8[9]Anderson R and Huhn M.Low cost attack on tamper resistant devices[C].IWSP:International workshop on security protocols,LNCS,1997:125-136.
  • 9[10]Chris Karlof,Naveen Sastry,David Wagner.TinySec:a link layer security architecture for wireless sensor networks[C].Proceedings of ACM SensSys 2004,Nov.,2004.
  • 10[11]Adrian Perrig and et al.SPINS:security protocols for sensor networks[J].Journal of Wireless Networks,2002,8(5):521-534.

同被引文献74

引证文献11

二级引证文献169

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部