Corpus ID: 46533275

Secure Wireless Sensor Networks: Problems and Solutions

@article{Hu2003SecureWS,
  title={Secure Wireless Sensor Networks: Problems and Solutions},
  author={Fei Hu and J. Ziobro and Jason Tillett and N. Sharma},
  journal={Journal on Systemics, Cybernetics and Informatics},
  year={2003},
  volume={1},
  pages={90-100}
}
  • Fei Hu, J. Ziobro, +1 author N. Sharma
  • Published 2003
  • Computer Science
  • Journal on Systemics, Cybernetics and Informatics
  • As sensor networks edge closer towards wide-spread deployment, security issues become a central concern. So far, the main research focus has been on making sensor networks feasible and useful, and less emphasis was placed on security. This paper analyzes security challenges in wireless sensor networks and summarizes key issues that should be solved for achieving the ad hoc security. It gives an overview of the current state of solutions on such key issues as secure routing, prevention of denial… CONTINUE READING
    50 Citations

    Figures and Topics from this paper

    A Secure Lightweight Architecture for Wireless Sensor Networks
    • M. Collins, S. Dobson, P. Nixon
    • Computer Science
    • 2008 The Second International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies
    • 2008
    • 5
    A Lightweight Security Framework for Wireless Sensor Networks
    • 38
    • PDF
    Security Threats in Wireless Sensor Networks
    • H. Sarma, A. Kar
    • Computer Science
    • Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology
    • 2006
    • 54

    References

    SHOWING 1-10 OF 75 REFERENCES
    CONSTRAINTS AND APPROACHES FOR DISTRIBUTED SENSOR NETWORK SECURITY
    • 771
    • PDF
    Denial of Service in Sensor Networks
    • 1,842
    • PDF
    Ubiquitous and Robust Authentication Services for Ad Hoc Wireless Networks
    • 129
    A secure routing protocol for ad hoc networks
    • 1,820
    • PDF
    A pairwise key pre-distribution scheme for wireless sensor networks
    • 1,238
    • Highly Influential
    • PDF
    Security for Sensor Networks
    • 109
    • PDF
    Securing ad hoc networks
    • 2,912
    • Highly Influential
    • PDF
    Secure routing for mobile ad hoc networks
    • 859
    • PDF