2005
DOI: 10.1007/978-3-540-30496-8_14
|View full text |Cite
|
Sign up to set email alerts
|

A Security Architecture for Mobile Wireless Sensor Networks

Abstract: Abstract. Wireless sensor networks increasingly become viable solutions to many challenging problems and will successively be deployed in many areas in the future. However, deploying new technology without security in mind has often proved to be unreasonably dangerous. We propose a security architecture for self-organizing mobile wireless sensor networks that prevents many attacks these networks are exposed to. Furthermore, it limits the security impact of some attacks that cannot be prevented. We analyse our … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
32
0

Year Published

2006
2006
2022
2022

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 32 publications
(32 citation statements)
references
References 19 publications
0
32
0
Order By: Relevance
“…The position of sensor nodes need not be engineered or pre-determined [15]. The sensor network protocols and algorithms must possess self-organizing capabilities [13]. Instead of send-ing the raw data to the nodes responsible for the fusion, sensor nodes use their pro-cessing abilities to locally carry out simple computations and transmit only the required and partially processed data [17] and this technique is known as 'data aggregation'.…”
Section: Sensor Network and Environmentmentioning
confidence: 99%
See 2 more Smart Citations
“…The position of sensor nodes need not be engineered or pre-determined [15]. The sensor network protocols and algorithms must possess self-organizing capabilities [13]. Instead of send-ing the raw data to the nodes responsible for the fusion, sensor nodes use their pro-cessing abilities to locally carry out simple computations and transmit only the required and partially processed data [17] and this technique is known as 'data aggregation'.…”
Section: Sensor Network and Environmentmentioning
confidence: 99%
“…The most common form of WSN topology consists of the a collection of a large number of sensor nodes and a Base Station (BS). Each sensor nodes are constrained by limited battery power, small memory, low computational ability and limited transmission range [13]. On the other hand the BS has larger memory and processing power.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The common security threats include information disclosure, message injection, sleep deprivation attack etc [5]. An attacker may capture and compromise a node and thus be able to control some part or even the whole network exclusively [5].…”
mentioning
confidence: 99%
“…The common security threats include information disclosure, message injection, sleep deprivation attack etc [5]. An attacker may capture and compromise a node and thus be able to control some part or even the whole network exclusively [5]. For example, in a sleep deprivation attack the intruder makes a node or a set of nodes to remain busy; so that they waste their energy while carrying out the task for the intruders [6].…”
mentioning
confidence: 99%