Security for fixed sensor networks
ACM-SE 42 Proceedings of the 42nd annual Southeast regional conference
Security support for in-network processing in Wireless Sensor Networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Security for wireless sensor networks
Wireless sensor networks
Security for wireless sensor networks
Wireless sensor networks
A Localized, Distributed Protocol for Secure Information Exchange in Sensor Networks
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 12 - Volume 13
Survey and benchmark of block ciphers for wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Battery power-aware encryption
ACM Transactions on Information and System Security (TISSEC)
A New Scheme for Mobility, Sensing, and Security Management in Wireless Ad Hoc Sensor Networks
ANSS '06 Proceedings of the 39th annual Symposium on Simulation
Computer Networks: The International Journal of Computer and Telecommunications Networking
Combinatorial design of key distribution mechanisms for wireless sensor networks
IEEE/ACM Transactions on Networking (TON)
Reliable data delivery in wireless sensor networks using distributed cluster monitoring
International Journal of Sensor Networks
Energy-efficient distributed authorisation server (DAS) placement for sensor networks
International Journal of High Performance Computing and Networking
PLUS: parameterised localised trust management-based security framework for sensor networks
International Journal of Sensor Networks
Security and Service Quality Analysis for Cluster-Based Wireless Sensor Networks
WWIC '07 Proceedings of the 5th international conference on Wired/Wireless Internet Communications
A scalable anonymous protocol for heterogeneous wireless ad hoc networks
Journal of Embedded Computing - Selected papers of EUC 2005
Mobility, sensing, and security management in wireless ad hoc sensor systems
Computers and Electrical Engineering
Anonymous communication protocol for sensor networks
International Journal of Wireless and Mobile Computing
Security architecture for IEEE 802.15.4-based wireless sensor network
ISWPC'09 Proceedings of the 4th international conference on Wireless pervasive computing
A performance evaluation of intrusion-tolerant routing in wireless sensor networks
IPSN'03 Proceedings of the 2nd international conference on Information processing in sensor networks
Physiological value-based efficient usable security solutions for body sensor networks
ACM Transactions on Sensor Networks (TOSN)
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
Adaptive security protocol selection for mobile computing
Journal of Network and Computer Applications
A generic evaluation method for key management schemes in wireless sensor network
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication
μTESLA-based secure routing protocol for wireless sensor networks
Proceedings of the First International Workshop on Security and Privacy Preserving in e-Societies
Compromised nodes in wireless sensor network
APWeb'06 Proceedings of the 2006 international conference on Advanced Web and Network Technologies, and Applications
Low energy consumption security method for protecting information of wireless sensor network
APWeb'06 Proceedings of the 2006 international conference on Advanced Web and Network Technologies, and Applications
Secure location verification using radio broadcast
OPODIS'04 Proceedings of the 8th international conference on Principles of Distributed Systems
Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures
Journal of Network and Computer Applications
Efficient mechanisms for secure inter-node and aggregation processing in sensor networks
ADHOC-NOW'05 Proceedings of the 4th international conference on Ad-Hoc, Mobile, and Wireless Networks
Security challenges in embedded systems
ACM Transactions on Embedded Computing Systems (TECS) - Special section on ESTIMedia'12, LCTES'11, rigorous embedded systems design, and multiprocessor system-on-chip for cyber-physical systems
Hi-index | 0.00 |
Networks of wireless microsensors for monitoring physical environments have emerged as an important new application area for wireless technology. Key attributes of these new types of networked systems are the severely constrained computational and energy resources, and anad hoc operational environment. This paper is a study of the communication security aspects of these networks. Resource limitations and specific architecture of sensor networks call for customized security mechanisms. Our approach is to classify the types of data existing in sensor networks, and identify possible communication security threats according to that classification. We propose a communication security scheme where for each type of data we define a corresponding security mechanism. By employing this multitiered security architecture where each mechanism has different resource requirements, we allow for efficient resource management, which is essential for wireless sensor networks.