无线传感器网络安全技术 应用研究方向总结 Wireless Sensor Networks Security.docVIP

  • 4
  • 0
  • 约2.85万字
  • 约 10页
  • 2016-11-01 发布于安徽
  • 举报

无线传感器网络安全技术 应用研究方向总结 Wireless Sensor Networks Security.doc

无线传感器网络安全技术 应用研究方向总结 Wireless Sensor Networks Security.doc

无线传感器网络安全技术 研究方向总结 Wireless Sensor Networks Security After finishing the literature in the Wireless Sensor Network (WSN) security area, the security architecture (security map) of security issues in WSN is drawn as in the following figure: Also, the security areas in WSN can be categorized into seven categories. Details about these categories are listed in the following table: Categories Sub-categories Publications Survey. Generic [1] [2] [3] [4][5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] Secure Routing [17] [18] Secure Aggregation [19] [20] Secure Localization [21] [22] Cryptography. Asymmetric [23] [24] [25] [26] [27] [28] [29] [30] [31] [32] [33] [34] [35] Symmetric [36] [37] [38] Secure Data Aggregation - [39] [40] [41] [42] [43] [44] [45] [46] [47] [48] [49] [50] [51] [52] [53] [54] Secure Routing - [55] [56] [57] [58] [59] [60] [61] [62] [63] [64] [65] [66] [67] [68] [69] [70] [71] Key Management. Probabilistic [96] [97] [98] [99] [100] [101] [99] [102] [103] [104] [105] [106] [107] [108] [109] Deterministic [110] [111] [112] Location Aware Security. Location Verification [113] [114] [115] [116] [117] [118] [119] [120] [121] [122] [123] [124] [125] Attacks Sybil [72] [73] [74] [75] [76] [75] Wormhole [77] [78] [79] [80] [81] [82] [83] [84] [85] [86] DOS [87] [88] [89] [90] [91] Node Replication [92] Node Compromise [93] [94] [95] Hint: this table is still under ongoing update/review and can be downloaded in pdf format from here. Please update us with any missing publications. All the contact details can be found in the top right menu. References: [1] Lidong Zhou and Zygmunt J. Haas. Securing ad hoc networks. IEEE Network, 13(6):24-30, 1999. [2] Frank Stajano and Ross J. Anderson. The resurrecting duckling: Security issues for ad-hoc wireless networks. In Bruce Christianson, Bruno Crispo, James A. Malcolm, and Michael Roe, editors, Security Protocols Workshop, volume 1796 of Lecture Notes in Compu

文档评论(0)

1亿VIP精品文档

相关文档