Research on the Security Strategy for Wireless Sensor Networks

被引:0
作者
Zhang, Jing [1 ]
机构
[1] Huaihai Inst Technol, Coll Elect Engn, Lian Yungang, Peoples R China
来源
2010 THE 3RD INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND INDUSTRIAL APPLICATION (PACIIA2010), VOL V | 2010年
关键词
wireless sensor networks(WSNs); security strategy; key management; security routing; security integration; intrusion detection; SCHEMES;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A wireless sensors networks (WSNs) consist of a number of sensor nodes connected through a wireless network that detect data and relay the detected data to the sink node using the multi-hop wireless transmission.Now,one of the most important issue is how to implent critical security tasks such as intrusion or tamper detection, and therefore must be protected. In this paper,we first analyse the security challenges in the wireless sensor network from the application layer, transport layer, network layer, data link layer and physical layer based on the system model. Then we give the security strategy which usually used in wireless sensor networks from the key management, security routing, security integration, intrusion detection and confidence model. This strategy can ensure the data confidentially implement, reliably generate, efficiently integrate and securely transmit.
引用
收藏
页码:100 / 103
页数:4
相关论文
共 20 条
  • [1] AKYLIDIZ IF, 2002, IEEE PERSONAL COMMUN
  • [2] Braginsky D., 2002, WSNA 02
  • [3] Random key predistribution schemes for sensor networks
    Chan, HW
    Perrig, A
    Song, D
    [J]. 2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2003, : 197 - 213
  • [4] Deng J, 2003, SECURIT SUPPORT IN N
  • [5] Deng J., 2002, CUCS93902
  • [6] Eschenauer L., 2002, ACM CCS2002, DOI DOI 10.1145/586110.586117
  • [7] Fan Ye, 2004, P IEEE INFOCOM 04
  • [8] Gandham SR, 2003, GLOB TELECOMM CONF, P377
  • [9] Ganesan D., 2002, MOBILE COMPUTING COM, V5, P11
  • [10] HU L, 2003, P WORKSH SEC ASS AD