skip to main content
article
Free Access

Security in wireless sensor networks

Published:01 June 2004Publication History
Skip Abstract Section

Abstract

They are susceptible to a variety of attacks, including node capture, physical tampering, and denial of service, while prompting a range of fundamental research challenges.

Skip Supplemental Material Section

Supplemental Material

References

  1. Adamy, D. EW 101: A First Course in Electronic Warfare. Artech House Publishers, Norwood, MA, 2001.Google ScholarGoogle Scholar
  2. Deng, J., Han, R., and Mishra, S. A performance evaluation of intrusion-tolerant routing in wireless sensor networks. In Proceedings of the 2nd IEEE International Workshop on Information Processing in Sensor Networks (IPSN 2003) (Apr. 2003), 349--364. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Eschenauer, L. and Gligor, V. A key-management scheme for distributed sensor networks. In Proceedings of the 9th ACM Conference on Computer and Communication Security (Washington, D.C., Nov.). ACM Press, New York, 2002, 41--47. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Hu, Y.-C., Perrig, A., and Johnson, D. Packet leashes: A defense against wormhole attacks in wireless ad hoc networks. In Proceedings of IEEE Infocom 2003 (San Francisco, Apr. 1--3, 2003).Google ScholarGoogle ScholarCross RefCross Ref
  5. Karlof, C. and Wagner, D. Secure routing in wireless sensor networks: Attacks and countermeasures. In Proceedings of the 1st IEEE International Workshop on Sensor Network Protocols and Applications (Anchorage, AK, May 11, 2003).Google ScholarGoogle ScholarCross RefCross Ref
  6. Perrig, A., Szewczyk, R., Wen, V., Culler, D., and Tygar, J. SPINS: Security protocols for sensor networks. J. Wireless Nets. 8, 5 (Sept. 2002), 521--534. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Przydatek, B., Song, D., and Perrig, A. SIA: Secure information aggregation in sensor networks. In Proceedings of the 1st ACM International Conference on Embedded Networked Sensor Systems (SenSys 2003) (Los Angeles, Nov. 5--7). ACM Press, New York, 2003, 255--265. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Wood, A., Stankovic, J., and Son, S. JAM: A mapping service for jammed regions in sensor networks. In Proceedings of the IEEE Real-Time Systems Symposium (Cancun, Mexico, Dec. 3--5, 2003).Google ScholarGoogle Scholar
  9. Wood, A. and Stankovic, J. Denial of service in sensor networks. IEEE Comput. (Oct. 2002), 54--62. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Security in wireless sensor networks

                          Recommendations

                          Comments

                          Login options

                          Check if you have access through your login credentials or your institution to get full access on this article.

                          Sign in

                          Full Access

                          • Published in

                            cover image Communications of the ACM
                            Communications of the ACM  Volume 47, Issue 6
                            Wireless sensor networks
                            June 2004
                            93 pages
                            ISSN:0001-0782
                            EISSN:1557-7317
                            DOI:10.1145/990680
                            Issue’s Table of Contents

                            Copyright © 2004 ACM

                            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                            Publisher

                            Association for Computing Machinery

                            New York, NY, United States

                            Publication History

                            • Published: 1 June 2004

                            Permissions

                            Request permissions about this article.

                            Request Permissions

                            Check for updates

                            Qualifiers

                            • article

                          PDF Format

                          View or Download as a PDF file.

                          PDF

                          eReader

                          View online with eReader.

                          eReader

                          HTML Format

                          View this article in HTML Format .

                          View HTML Format