{"title":"Secure Service and Management for Security-Critical Wireless Sensor Network","authors":"Qiang Liu, Li Liu, Xiaohui Kuang, Yan Wen","doi":"10.1109/IMIS.2012.94","DOIUrl":null,"url":null,"abstract":"For Security-Critical Wireless Sensor Network (SCWSN), security should be given priority in design. In this paper, we analyze the essential security demands for security-critical WSN. Then, we propose our integrated approaches, which are built based on security service and management, to achieve security for security-critical WSN. Finally, we describe how our security solution works against typical attacks. There are four advantage characters to provide against attacks in the SCWSN we designed: feather-weight public key and share key combined key pre-distribution scheme, hop by hop packet signature and encryption in the route path, remote management of nodes and network route, data confidence analysis.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"24 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IMIS.2012.94","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
For Security-Critical Wireless Sensor Network (SCWSN), security should be given priority in design. In this paper, we analyze the essential security demands for security-critical WSN. Then, we propose our integrated approaches, which are built based on security service and management, to achieve security for security-critical WSN. Finally, we describe how our security solution works against typical attacks. There are four advantage characters to provide against attacks in the SCWSN we designed: feather-weight public key and share key combined key pre-distribution scheme, hop by hop packet signature and encryption in the route path, remote management of nodes and network route, data confidence analysis.