会议专题

Grouping Applications for Appropriate Security Provision in WSN

Wireless Sensor Networks (WSN) are gaining popularity due to their increasing use in different fields ranging from battlefield monitoring to healthcare services. WSNs are facing serious security challenges primarily due to insecure medium and unattended operations in hostile environments. Extensive studies in this regard have been done to secure WSN through different techniques. In this paper we argue that not all applications require same level of security for their proper operations, since applications do not face same level of hostile environment and motivation of attackers. In response we propose to group the applications according to security requirements which will enable researchers to better understand security issues and develop solutions as per requirements of the application and interests of an attacker.

Sensor node Public Key Cryptography Elliptic Curve Cryptography Trusted Server BROSK LEAP

Muhammad Zahir Shah Aftab Alam Gohar Ali

Computer Science & IT Govt. Degree College Lachi Lachi, K.P.K, Pakistan Computer Science & IT University of Malakand Chakdara, K.P.K, Pakistan Swift Registration Centre NADRA Peshawar, K.P.K, Pakistan

国际会议

2010 International Conference on Software and Computing Technology(2010年软件与计算机技术国际会议 ICSCT 2010)

昆明

英文

559-563

2010-10-17(万方平台首次上网日期,不代表论文的发表时间)