SECURING WIRELESS SENSOR NETWORKS: A SURVEY

被引:226
|
作者
Zhou, Yun [1 ]
Fang, Yuguang [1 ]
Zhang, Yanchao [2 ]
机构
[1] Univ Florida, Dept Elect & Comp Engn, Gainesville, FL 32611 USA
[2] New Jersey Inst Technol, Dept Elect & Comp Engn, Newark, NJ 07102 USA
来源
基金
美国国家科学基金会;
关键词
D O I
10.1109/COMST.2008.4625802
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The significant advances of hardware manufacturing technology and the development of efficient software algorithms make technically and economically feasible a network composed of numerous, small, low-cost sensors using wireless communications, that is, a wireless sensor network. WSNs have attracted intensive interest from both academia and industry due to their wide application in civil and military scenarios. In hostile scenarios, it is very important to protect WSNs from malicious attacks. Due to various resource limitations and the salient features of a wireless sensor network, the security design for such networks is significantly challenging. In this article, we present a comprehensive survey of WSN security issues that were investigated by researchers in recent years and that shed light on future directions for WSN security.
引用
收藏
页码:6 / 28
页数:23
相关论文
共 50 条
  • [1] Securing Cognitive Wireless Sensor Networks: A Survey
    Fragkiadakis, Alexandros
    Angelakis, Vangelis
    Tragos, Elias Z.
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2014,
  • [2] Securing wireless sensor networks
    Yi, Xun
    Faulkner, Mike
    Okamoto, Eiji
    ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 497 - +
  • [3] Securing sensor reports in wireless sensor networks
    Pathan, Al-Sakib Khan
    Hong, Choong Seon
    EURO-PAR 2007 PARALLEL PROCESSING, PROCEEDINGS, 2007, 4641 : 881 - +
  • [4] Securing the Internet of Things and Wireless Sensor Networks via Machine Learning: A Survey
    Mamdouh, Marwa
    Elrukhsi, Mohamed A. I.
    Khattab, Ahmed
    2018 INTERNATIONAL CONFERENCE ON COMPUTER AND APPLICATIONS (ICCA), 2018, : 215 - 218
  • [5] Securing wireless sensor networks: Security architectures
    Boyle, David
    Newe, Thomas
    Journal of Networks, 2008, 3 (01) : 65 - 77
  • [6] Securing and Greening Wireless Sensor Networks with Beamforming
    Valenzuela-Valdes, J. . F.
    Luna, F.
    Padilla, P.
    Padilla, J. L.
    Luque-Baena, R.
    Agudo, J. E.
    MOBILE NETWORKS & APPLICATIONS, 2019, 24 (02): : 712 - 720
  • [7] Securing group communication in wireless sensor networks
    Thepvilojanapong, N
    Tobe, Y
    Sezaki, K
    TENCON 2004 - 2004 IEEE REGION 10 CONFERENCE, VOLS A-D, PROCEEDINGS: ANALOG AND DIGITAL TECHNIQUES IN ELECTRICAL ENGINEERING, 2004, : C188 - C191
  • [8] Securing and Greening Wireless Sensor Networks with Beamforming
    J . F. Valenzuela-Valdés
    F. Luna
    P. Padilla
    J. L. Padilla
    R. Luque-Baena
    J. E. Agudo
    Mobile Networks and Applications, 2019, 24 : 712 - 720
  • [9] Securing wireless sensor networks against spurious injections
    Chowdhury, Atanu Roy
    Tripathy, Somanath
    Nandi, Sukumar
    2007 2ND INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS SOFTWARE & MIDDLEWARE, VOLS 1 AND 2, 2007, : 287 - +
  • [10] Securing Wireless Sensor Networks Using Cluster Reformations
    Wang, Gicheol
    Choi, Deokjai
    Kang, Daewook
    EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 2, WORKSHOPS, 2008, : 306 - +