{"title":"Wireless sensor networks - a security perspective","authors":"H. Tahir, S. Shah","doi":"10.1109/INMIC.2008.4777734","DOIUrl":null,"url":null,"abstract":"Increased interest in the field of wireless sensor networks has proved that wireless sensor networks can have a broad variety of applications. Current applications of wireless sensor networks are in the fields of medical care, battlefield monitoring, environment monitoring, surveillance and disaster prevention. Many of these applications require that the sensor network be deployed in an area that is hostile, inaccessible and mission critical. Keeping in view the resource starved nature of sensor networks and its application domains, the requirements for a secure sensor network has become two fold. We have analyzed sensor networks from a security perspective by pointing out vulnerabilities in sensor networks. A summary of threat models and security benchmarks has also been pointed out to explain the aims and objectives of a secure wireless senor network. We have also explained various attacks and their prevention mechanisms.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"22 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"19","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 IEEE International Multitopic Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INMIC.2008.4777734","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 19
Abstract
Increased interest in the field of wireless sensor networks has proved that wireless sensor networks can have a broad variety of applications. Current applications of wireless sensor networks are in the fields of medical care, battlefield monitoring, environment monitoring, surveillance and disaster prevention. Many of these applications require that the sensor network be deployed in an area that is hostile, inaccessible and mission critical. Keeping in view the resource starved nature of sensor networks and its application domains, the requirements for a secure sensor network has become two fold. We have analyzed sensor networks from a security perspective by pointing out vulnerabilities in sensor networks. A summary of threat models and security benchmarks has also been pointed out to explain the aims and objectives of a secure wireless senor network. We have also explained various attacks and their prevention mechanisms.