期刊文献+

无线传感器网络安全体系结构分析

Analysis of Security Architectures for Wireless Sensor Networks
下载PDF
导出
摘要 详细介绍了无线传感器网络的特点、面临的各种安全威协和安全目标.分析了目前已提出的无线传感器网络安全体系结构,并对它们的特性进行了比较.最后总结和讨论了无线传感器网络安全体系结构的研究方向. The characteristics of wireless sensor networks,the threats to wireless sensor networks and security goals were presented.This paper provides details of proposed and implemented security architectures optimal for use with wireless sensor networks.These architectures will be reviewed,contrasted and compared based on their individual characteristics.At last,the further direction of sensor network security architectures was summarized and discussed.
出处 《南京晓庄学院学报》 2010年第6期93-97,共5页 Journal of Nanjing Xiaozhuang University
基金 南京晓庄学院培育项目(2010KYPY02)
关键词 传感器网络 DOS攻击 安全体系结构 sensor networks DoS attack security architectures
  • 相关文献

参考文献9

  • 1Perrig A.,et al.Security in Wireless Sensor Networks[J].Communications of the ACM,2004,47(6),53-57. 被引量:1
  • 2Garcia-Hemandez C.F.,et al.Wireless Sensor Networks and Applications:A Survey[J].UCSNS International Journal of Computer Science and Network Security,2007,7 (3),264-273. 被引量:1
  • 3Mona Sharifnejad,et al.A Survey on Wireless Sensor Networks Security[C].SETIT 20074th International Conference:Sciences of Electronic,Technologies of Information and Telecommunications March 25-29,2007,1-6. 被引量:1
  • 4Perrig,A.,Szewczyk,R.,Tygar,J.D.,Wen,V.and Culler,D SPINS:Security Protocols for Sensor Networks[J].Wireless Networks,2002,8(5),521-534. 被引量:1
  • 5Karlof,C.,Sastry,N.,Wagner,D.TinySec:A Link Layer Security Architecture for Wireless Sensor Networks[C].Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems,Baltimore,MD,November 2004,NY,USA:ACM Press,162-175. 被引量:1
  • 6Zhu,S.,Setia,S.,Jajodia,S.LEAP:Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks[C].CCS '03,Washington D.C.,USA,27-31 October 2003,New York,USA:ACM Press,62-72. 被引量:1
  • 7David Boyle.Securing Wireless Sensor Networks:security Architectures[J].JOURNAL OF NETWORKS,VOL.3,NO.1,JANUARY 2008,65-77. 被引量:1
  • 8覃志松,黄廷磊.Zigbee无线传感器网络安全研究及改进[J].微计算机信息,2010,26(8):54-55. 被引量:10
  • 9Heo,J.,Hong,C.S.Efficient and Authenticated Key A-greement Mechanism in Low-Rate WPAN Environment[C].International Symposium on Wireless Pervasive Computing 2006,Phuket,Thailand 16-18 January 2006,IEEE 2006,1-5. 被引量:1

二级参考文献6

  • 1郑强,王晓东.无线传感器网络安全研究[J].微计算机信息,2008(1):116-117. 被引量:13
  • 2ZigBee Alliance.ZigBee Specifications V1.0 [EB/L].http://www. zigbee.org/,2005-07-25. 被引量:1
  • 3AKYILDIZ I F.Wireless sensor networks:A survey [J].Computer Networks,2 [x] 2,38(4):393 -422. 被引量:1
  • 4CULLAR.ESTRIN.STRVASTAVAM.Overview of sensor network [J].Computer,2004,37(8):4149. 被引量:1
  • 5Bruce Schneier, Applied Cryptography, 2nd edition, Chapt-23 , John Wiley & Sons, 1996. 被引量:1
  • 6K. Wu, J. Harms, "Performance study of a multipath routing method for wireless mobile ad hoc networks", 9th international symposium on modeling. Analysis and simulation of computer and telecommunication system, 2001. 被引量:1

共引文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部