Secure sensor networks for perimeter protection

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure sensor networks for perimeter protection

Sensor networks have been identified as being useful in a variety of domains to include the battlefield and perimeter defense. We motivate the security problems that sensor networks face by developing a scenario representative of a large application class where these networks would be used in the future. We identify threats to this application class and propose a new lightweight security model ...

متن کامل

A Secure Routing Algorithm for Underwater Wireless Sensor Networks

Recently, underwater Wireless Sensor Networks (UWSNs) attracted the interest of many researchers and the past three decades have held the rapid progress of underwater acoustic communication. One of the major problems in UWSNs is how to transfer data from the mobile node to the base stations and choosing the optimized route for data transmission. Secure routing in UWSNs is necessary for packet d...

متن کامل

Secured Greedy Perimeter Stateless Routing for Wireless Sensor Networks

Wireless sensor networks are collections of large number of sensor nodes. The sensor nodes are featured with limited energy, computation and transmission power. Each node in the network coordinates with every other node in forwarding their packets to reach the destination. Since these nodes operate in a physically insecure environment; they are vulnerable to different types of attacks such as s...

متن کامل

Semantics-Aware Perimeter Protection

Web services security is becoming a critical concern for any organization adopting the XML-based Web services approach to application integration. While many access control techniques for Web services are becoming available, several issues still need to be solved in order to correctly split the burden of securing Web services between the perimetral and the service level. In this paper, a techni...

متن کامل

A Secure Agent Architecture for Sensor Networks

Advances in sensor and wireless technologies will enable thousands, or even millions of small but smart sensors to be deployed for a wide range of monitoring applications. The sensor networks must be dynamically configurable and adaptive in order to response actively to events. Security must also be built into sensor networks at the very initial design stage to prevent any potential threats. Th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Computer Networks

سال: 2003

ISSN: 1389-1286

DOI: 10.1016/s1389-1286(03)00352-9