APPLICATION OF WIRELESS SENSOR NETWORKS IN CRITICAL INFRASTRUCTURE PROTECTION: CHALLENGES AND DESIGN OPTIONS

被引:37
作者
Buttyan, Levente [1 ]
Gessner, Dennis [1 ]
Hessler, Alban [1 ]
Langendoerfer, Peter [1 ]
机构
[1] Budapest Univ Technol & Econ, Dept Telecommun, Budapest, Hungary
关键词
Wireless sensor networks; Protocols; Jamming; Monitoring; Topology; Cryptography;
D O I
10.1109/MWC.2010.5601957
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The protection of critical infrastructures provides an interesting application area for wireless sensor networks. Threats such as natural catastrophes, criminal or terrorist attacks against CIs are increasingly reported. The large-scale nature of CIs requires a scalable and low-cost technology for improving CI monitoring and surveillance. WSNs are a promising candidate to fulfill these requirements, but if the WSN becomes part of the CI in order to improve its reliability, then the dependability of the WSN itself needs to be significantly improved first. In this article we discuss the challenges and potential solutions to achieve dependability of WSNs taking into account accidental failures as well as intentional attacks. We inspect the whole system starting from individual sensor nodes via the protocol stack to the middleware layer above.
引用
收藏
页码:44 / 49
页数:6
相关论文
共 9 条
  • [1] Buchanan E., 2008, P ACM CCS
  • [2] BUTTYAN L, 2009, P IEEE WSNS
  • [3] BUTTYAN L, 2010, P IEEE INT C SENS NE
  • [4] CASTELLUCCIA C, 2009, P ACM CCS
  • [5] OPTIMAL ATTACK AND REINFORCEMENT OF A NETWORK
    CUNNINGHAM, WH
    [J]. JOURNAL OF THE ACM, 1985, 32 (03) : 549 - 561
  • [6] DENG J, 2006, PERVASIVE MOBILE COM, V2, P159
  • [7] DIMAKIS AG, 2006, IEEE ACM T NETWORK, V14, P2809
  • [8] Francillon A., 2009, THESIS I POLYTECHNIQ
  • [9] Data persistence in large-scale sensor networks with decentralized fountain codes
    Lin, Yunfeng
    Liang, Ben
    Li, Baochun
    [J]. INFOCOM 2007, VOLS 1-5, 2007, : 1658 - +