DocumentCode
2869702
Title
Security Methods for Wireless Sensor Networks
Author
Ren, Xiuli
Author_Institution
Sch. of Comput., Jilin Normal Univ., Siping
fYear
2006
fDate
25-28 June 2006
Firstpage
1925
Lastpage
1930
Abstract
Wireless sensor networks can be used for a wide range of potential applications such as military target tracking, environment monitoring, patient monitoring and scientific exploration in dangerous environments. When sensor networks are deployed in a hostile terrain, security becomes extremely important, as they are prone to different types of malicious attacks. Due to the resource limitations of sensor nodes, existing network security methods, including those developed for mobile ad-hoc networks, are not well suitable for wireless sensor networks. In this paper, we give some security methods to adapt to wireless sensor networks for sensor data and network control protocols
Keywords
protocols; telecommunication security; wireless sensor networks; malicious attacks; network control protocols; network security methods; sensor data; wireless sensor networks; Automation; Data security; Information security; Intelligent sensors; Mechatronics; Military computing; Patient monitoring; Protection; Wireless application protocol; Wireless sensor networks; key; method; protocol; security; wireless sensor networks;
fLanguage
English
Publisher
ieee
Conference_Titel
Mechatronics and Automation, Proceedings of the 2006 IEEE International Conference on
Conference_Location
Luoyang, Henan
Print_ISBN
1-4244-0465-7
Electronic_ISBN
1-4244-0466-5
Type
conf
DOI
10.1109/ICMA.2006.257548
Filename
4026389
Link To Document