An energy and trust-aware routing protocol for large wireless sensor networks
AIC'09 Proceedings of the 9th WSEAS international conference on Applied informatics and communications
Asymmetric key pre-distribution scheme for sensor networks
IEEE Transactions on Wireless Communications
Energy-aware secure routing for large wireless sensor networks
WSEAS TRANSACTIONS on COMMUNICATIONS
Secure and efficient data storage in unattended wireless sensor networks
NTMS'09 Proceedings of the 3rd international conference on New technologies, mobility and security
CAT: building couples to early detect node compromise attack in wireless sensor networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Noninteractive pairwise key establishment for sensor networks
IEEE Transactions on Information Forensics and Security
Secure geographic routing in ad hoc and wireless sensor networks
EURASIP Journal on Wireless Communications and Networking - Special issue on signal processing-assisted protocols and algorithms for cooperating objects and wireless sensor networks
Combining trust with location information for routing in wireless sensor networks
Wireless Communications & Mobile Computing
Confidential information protection system for mobile devices
Security and Communication Networks
A Novel Trust-Aware Geographical Routing Scheme for Wireless Sensor Networks
Wireless Personal Communications: An International Journal
Hi-index | 0.00 |
With sensor networks on the verge of deployment, security issues pertaining to the sensor networks are in the limelight. Though the security in sensor networks share many characteristics with wireless ad hoc networks, the two fields are rapidly diverging due to the fundamental differences between the make-up and goals of the two types of networks. Perhaps the greatest dividing difference is the energy and computational abilities. Sensor nodes are typically smaller, less powerful, and more prone to failure than nodes in an ad hoc network. These differences indicate that protocols that are valid in the context of ad-hoc networks may not be directly applicable for sensor networks. In this paper, we survey the state of art in securing wireless sensor networks. We review several protocols that provide security in sensor networks, with an emphasis on authentication, key management and distribution, secure routing, and methods for intrusion detection. Copyright © 2006 John Wiley & Sons, Ltd.