SECURING WIRELESS SENSOR NETWORKS: A SURVEY

被引:228
作者
Zhou, Yun [1 ]
Fang, Yuguang [1 ]
Zhang, Yanchao [2 ]
机构
[1] Univ Florida, Dept Elect & Comp Engn, Gainesville, FL 32611 USA
[2] New Jersey Inst Technol, Dept Elect & Comp Engn, Newark, NJ 07102 USA
来源
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS | 2008年 / 10卷 / 03期
基金
美国国家科学基金会;
关键词
D O I
10.1109/COMST.2008.4625802
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The significant advances of hardware manufacturing technology and the development of efficient software algorithms make technically and economically feasible a network composed of numerous, small, low-cost sensors using wireless communications, that is, a wireless sensor network. WSNs have attracted intensive interest from both academia and industry due to their wide application in civil and military scenarios. In hostile scenarios, it is very important to protect WSNs from malicious attacks. Due to various resource limitations and the salient features of a wireless sensor network, the security design for such networks is significantly challenging. In this article, we present a comprehensive survey of WSN security issues that were investigated by researchers in recent years and that shed light on future directions for WSN security.
引用
收藏
页码:6 / 28
页数:23
相关论文
共 157 条
[31]  
Chadha A., 2005, P 2 ANN IEEE COMM SO
[32]  
Chan H., 2005, P 24 ANN IEEE JOINT
[33]  
Chan H., 2004, WIRELESS SENSOR NETW
[34]   On the distribution and revocation of cryptographic keys in sensor networks [J].
Chan, HW ;
Gligor, VD ;
Perrig, A ;
Muralidharan, G .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2005, 2 (03) :233-247
[35]   Random key predistribution schemes for sensor networks [J].
Chan, HW ;
Perrig, A ;
Song, D .
2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2003, :197-213
[36]  
Chen J-Y., 2005, P 4 INT S INF PROC S
[37]  
Dahill Bridget, 2002, P 10 IEEE INT C NETW
[38]  
Delgosha F, 2006, P 25 ANN IEEE JOINT
[39]  
Delgosha F., 2005, P 2 ANN IEEE COMM SO
[40]  
Deng J., 2005, P 1 IEEE INT C SEC P