Skip to main content

2013 | OriginalPaper | Buchkapitel

19. Security in Sensor Networks

verfasst von : Joseph Migga Kizza

Erschienen in: Guide to Computer Network Security

Verlag: Springer London

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The rapid development of wireless technology in the last few years has created new interest in low-cost wireless sensor networks. Wireless sensor networks (WSNs) or just sensor networks are grids or networks made of spatially distributed autonomous but cooperating tiny devices called sensors, all of which have sensing capabilities that are used to detect, monitor, and track physical or environmental conditions, such as temperature, sound, vibration, pressure, motion, or pollutants, at different locations [1]. A sensor, similar to that in Fig. 19.1, is a small device that produces a measurable response to a change in a physical condition. Sensor nodes can be independently used to measure a physical quantity and to convert it into a signal that can be read by an observer or by an instrument [1]. The network may consist of just a few or thousands of tiny, mostly immobile, usually, randomly deployed nodes, covering a small or large geographical area. In many cases, sensor networks do not require predetermined positioning when they are randomly deployed, making them viable for inaccessible terrains where they can quickly self-organize and form a network on the fly.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
4.
Zurück zum Zitat Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., and Cayirci, A. “A Survey on Sensor Networks,” IEEE Communications Magazine, August 2002, pp 102–114. Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., and Cayirci, A. “A Survey on Sensor Networks,” IEEE Communications Magazine, August 2002, pp 102–114.
7.
Zurück zum Zitat Sure, A., Iyengar, S. S., and Cho E. “Ecoinformatics Using Wireless sensor Networks: An Overview.” Ecological Informatics. 2006 1, 287–293.CrossRef Sure, A., Iyengar, S. S., and Cho E. “Ecoinformatics Using Wireless sensor Networks: An Overview.” Ecological Informatics. 2006 1, 287–293.CrossRef
16.
Zurück zum Zitat Perrig, A., Stankovic, J., and Wagner, D. “Security in Wireless Sensor Networks.” Communication of the ACM, 2004 47(6) 53–57.CrossRef Perrig, A., Stankovic, J., and Wagner, D. “Security in Wireless Sensor Networks.” Communication of the ACM, 2004 47(6) 53–57.CrossRef
17.
Zurück zum Zitat Eschenauer, L. and Gligor, V.D. “A Key-management Scheme for Distributed Sensor Networks.” In ACM Conference on Computer and Communications Security, 2002. Eschenauer, L. and Gligor, V.D. “A Key-management Scheme for Distributed Sensor Networks.” In ACM Conference on Computer and Communications Security, 2002.
18.
Zurück zum Zitat Sabbah, E., Majeed, A., Kyoung-Don, K., Liu, K., and Abu-Ghazaleh, N. “An Application-Driven Perspective on Wireless Sensor Network Security,” Q2SWinet’06, October 2, 2006. Sabbah, E., Majeed, A., Kyoung-Don, K., Liu, K., and Abu-Ghazaleh, N. “An Application-Driven Perspective on Wireless Sensor Network Security,” Q2SWinet’06, October 2, 2006.
19.
Zurück zum Zitat Zhu, S., Setia, S., and Jajodia, S. “LEAP: Efficient Security Mechanisms for Large-scale Distributed Sensor Networks”. In the 10th ACM Conference on Computer and Communication Security (CCS ’03), 2003. Zhu, S., Setia, S., and Jajodia, S. “LEAP: Efficient Security Mechanisms for Large-scale Distributed Sensor Networks”. In the 10th ACM Conference on Computer and Communication Security (CCS ’03), 2003.
20.
Zurück zum Zitat Karlof, C., Sastry, N., and Wagner, D. “TinySec: A Link Layer Security Architecture for Wireless Sensor Networks”. In ACM SenSys, 2004. Karlof, C., Sastry, N., and Wagner, D. “TinySec: A Link Layer Security Architecture for Wireless Sensor Networks”. In ACM SenSys, 2004.
Metadaten
Titel
Security in Sensor Networks
verfasst von
Joseph Migga Kizza
Copyright-Jahr
2013
Verlag
Springer London
DOI
https://doi.org/10.1007/978-1-4471-4543-1_19

Neuer Inhalt