Skip to main content
Top

2013 | OriginalPaper | Chapter

35. Study of Security Technology in Wireless Sensor Networks

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Due to its own characteristics, wireless sensor networks are different from the wired network security issues in the operating system and network protocol design. ZigBee technology, for example, is the use of security technology to analyze its security features and security requirements from multiple perspectives, and describes the specific application of the ZigBee network security encryption technology.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Liu Z (2008) Wireless sensor networks in a secure LEACH protocol. Comput Sci 09:2813–2815 Liu Z (2008) Wireless sensor networks in a secure LEACH protocol. Comput Sci 09:2813–2815
2.
go back to reference Tan Z, Huang T (2010) Zigbee wireless sensor network security research and improvement. Comput Inf 08:54–55 Tan Z, Huang T (2010) Zigbee wireless sensor network security research and improvement. Comput Inf 08:54–55
3.
4.
go back to reference Xu X, Gao Y, Zhang W (2009) Research and discussion based on the IEEE 802.15.4 ZigBee wireless. Netw Data Transm Secur Inf Netw Secur 06:10–12 Xu X, Gao Y, Zhang W (2009) Research and discussion based on the IEEE 802.15.4 ZigBee wireless. Netw Data Transm Secur Inf Netw Secur 06:10–12
5.
go back to reference Chen X (2010) Wireless sensor network-based security policy. Digit Technol Appl 05:100–103 Chen X (2010) Wireless sensor network-based security policy. Digit Technol Appl 05:100–103
6.
go back to reference Cao J, Zhang Z (2011) Wireless sensor network security improvement program. Mod Electron Technol 12:38–40 Cao J, Zhang Z (2011) Wireless sensor network security improvement program. Mod Electron Technol 12:38–40
7.
go back to reference Wang Y, Wei Wei, Lu D (2008) Review of the wireless sensor network security. Comput Age 12:15–19MathSciNet Wang Y, Wei Wei, Lu D (2008) Review of the wireless sensor network security. Comput Age 12:15–19MathSciNet
8.
go back to reference Li J, Sun Y (2010) ZigBee-based wireless personal area network security mechanisms. World Digit Commun 07:68–70 Li J, Sun Y (2010) ZigBee-based wireless personal area network security mechanisms. World Digit Commun 07:68–70
Metadata
Title
Study of Security Technology in Wireless Sensor Networks
Author
Chunjie Tang
Copyright Year
2013
Publisher
Springer London
DOI
https://doi.org/10.1007/978-1-4471-4853-1_35