Research on the Security Strategy for Wireless Sensor Networks

被引:0
|
作者
Zhang, Jing [1 ]
机构
[1] Huaihai Inst Technol, Coll Elect Engn, Lian Yungang, Peoples R China
关键词
wireless sensor networks(WSNs); security strategy; key management; security routing; security integration; intrusion detection; SCHEMES;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A wireless sensors networks (WSNs) consist of a number of sensor nodes connected through a wireless network that detect data and relay the detected data to the sink node using the multi-hop wireless transmission.Now,one of the most important issue is how to implent critical security tasks such as intrusion or tamper detection, and therefore must be protected. In this paper,we first analyse the security challenges in the wireless sensor network from the application layer, transport layer, network layer, data link layer and physical layer based on the system model. Then we give the security strategy which usually used in wireless sensor networks from the key management, security routing, security integration, intrusion detection and confidence model. This strategy can ensure the data confidentially implement, reliably generate, efficiently integrate and securely transmit.
引用
收藏
页码:100 / 103
页数:4
相关论文
共 50 条
  • [1] Research on the Security Strategy for Wireless Sensor Networks
    Zhang, Jing
    APPLIED INFORMATICS AND COMMUNICATION, PT 5, 2011, 228 : 157 - 164
  • [2] Research on Security of Wireless Sensor Networks
    Li, Hongli
    Sun, Huiqin
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTERNET TECHNOLOGY AND SECURITY (ITS 2010), 2010, : 109 - 114
  • [3] Research on Security Problems in Wireless Sensor Networks
    Liu, Wentao
    INDUSTRIAL INSTRUMENTATION AND CONTROL SYSTEMS II, PTS 1-3, 2013, 336-338 : 2415 - 2418
  • [4] Security for Wireless Sensor Networks
    Wang, Yilin
    Qin, Maosheng
    INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION AND SYSTEMS (ICCAS 2010), 2010, : 844 - 848
  • [5] Security in Wireless Sensor Networks
    Obaidat, Mohammed S.
    Nicopolitidis, Petros
    Li, Jung-Shian
    SECURITY AND COMMUNICATION NETWORKS, 2009, 2 (02) : 101 - 103
  • [6] Security in wireless sensor networks
    Giruka, Venkata C.
    Singhal, Mukesh
    Royalty, James
    Varanasi, Srilekha
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2008, 8 (01): : 1 - 24
  • [7] On the security of wireless sensor networks
    Roman, R
    Zhou, JY
    Lopez, J
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2005, PT 3, 2005, 3482 : 681 - 690
  • [8] Security in Wireless Sensor Networks
    Aranzazu Suescun, Catalina
    SISTEMAS & TELEMATICA, 2009, 7 (13): : 43 - 73
  • [9] Security in wireless sensor networks
    Du, Xiaojiang
    Chen, Hsiao-Hwa
    IEEE WIRELESS COMMUNICATIONS, 2008, 15 (04) : 60 - 66
  • [10] Security in wireless sensor networks
    Perrig, A
    Stankovic, J
    Wagner, D
    COMMUNICATIONS OF THE ACM, 2004, 47 (06) : 53 - 57