Grouping Applications for Appropriate Security Provision in WSN
Wireless Sensor Networks (WSN) are gaining popularity due to their increasing use in different fields ranging from battlefield monitoring to healthcare services. WSNs are facing serious security challenges primarily due to insecure medium and unattended operations in hostile environments. Extensive studies in this regard have been done to secure WSN through different techniques. In this paper we argue that not all applications require same level of security for their proper operations, since applications do not face same level of hostile environment and motivation of attackers. In response we propose to group the applications according to security requirements which will enable researchers to better understand security issues and develop solutions as per requirements of the application and interests of an attacker.
Sensor node Public Key Cryptography Elliptic Curve Cryptography Trusted Server BROSK LEAP
Muhammad Zahir Shah Aftab Alam Gohar Ali
Computer Science & IT Govt. Degree College Lachi Lachi, K.P.K, Pakistan Computer Science & IT University of Malakand Chakdara, K.P.K, Pakistan Swift Registration Centre NADRA Peshawar, K.P.K, Pakistan
国际会议
2010 International Conference on Software and Computing Technology(2010年软件与计算机技术国际会议 ICSCT 2010)
昆明
英文
559-563
2010-10-17(万方平台首次上网日期,不代表论文的发表时间)