Designing Secure Protocols for Wireless Sensor Networks

WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, PROCEEDINGS(2008)

引用 35|浏览0
暂无评分
摘要
Over the years, a myriad of protocols have been proposed for resource-limited Wireless Sensor Networks (WSNs). Similarly, security research for WSNs has also evolved over the years. Although fundamental notions of WSN research are well established, optimization of the limited resources has motivated new research directions in the field. In this paper, we seek to present general principles to aid in the design of secure WSN protocols. Therefore, building upon both the established and the new concepts, envisioned applications, and the experience garnered from the WSNs research, we first review the desired security services (i.e., confidentiality, authentication, integrity, access control, availability, and nonrepudiation) from WSNs perspective. Then, we question which services would be necessary for resource-constrained WSNs and when it would be most reasonable to implement them for a WSN application.
更多
查看译文
关键词
wsn research,secure wsn protocol,wsns perspective,designing secure protocols,resource-constrained wsns,wsns research,new research direction,security research,wireless sensor networks,security service,new concept,wsn application,access control,security protocol,wireless sensor network
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要