Security for Wireless Sensor Networks: A Review

被引:28
作者
Healy, Michael [1 ]
Newe, Thomas [1 ]
Lewis, Elfed [1 ]
机构
[1] Univ Limerick, Opt Fibre Sensors Res Ctr, Dept Elect & Comp Engn, Limerick, Ireland
来源
SAS 2009 - IEEE SENSORS APPLICATIONS SYMPOSIUM, PROCEEDINGS | 2009年
关键词
wireless sensor networks; security; threats; attacks; performance; sensor nodes;
D O I
10.1109/SAS.2009.4801782
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Due to the sensitive nature of the data gathered by many wireless sensor networks (WSNs) it is becoming critical that this data be protected. However, due to the constrained nature of the resources available on sensor nodes, traditional wireless networking security solutions are not viable due to their processing requirements, power consumption, speed and communications overhead. We review the threats and attacks faced by WSNs and then the current state of the art of dedicated WSN security protocols are examined and compared, focusing on their relative strengths and weaknesses.
引用
收藏
页码:80 / 85
页数:6
相关论文
共 14 条
[1]  
Anderson R, 1996, PROCEEDINGS OF THE SECOND USENIX WORKSHOP ON ELECTRONIC COMMERCE, P1
[2]  
[Anonymous], 2004, P 2 INT C EMB NETW S, DOI DOI 10.1145/1031495.1031515
[3]   Sizzle: A standards based end-to-end security architecture for the embedded Internet [J].
Gupta, V ;
Millard, M ;
Fung, S ;
Zhu, Y ;
Gura, N ;
Eberle, H ;
Shantz, SC .
Third IEEE International Conference on Pervasive Computing and Communications, Proceedings, 2005, :247-256
[4]  
*IEEE STAND ASS, 2003, 802154 MAC PHY LRPAN
[5]  
KARYGIANNIS T, 2002, NISTSP80048 NAT I ST
[6]  
LAW Y, 2004, IEEE INT C MOB AD HO, P447
[7]  
LI T, 2005, 2 INT WORKSH NETW SE
[8]  
LUK M, 2007, IEEE INT C INF PROC
[9]   SPINS: Security protocols for sensor networks [J].
Perrig, A ;
Szewczyk, R ;
Tygar, JD ;
Wen, V ;
Culler, DE .
WIRELESS NETWORKS, 2002, 8 (05) :521-534
[10]  
SASTRY N, 2004, 2004 ACM WORKSH WIR, P32