{"title":"The Research of Security Threat and Corresponding Defense Strategy for WSN","authors":"Li Yi, Fu Zhongyong","doi":"10.1109/ICMTMA.2015.310","DOIUrl":null,"url":null,"abstract":"As wireless sensor network (WSN) become an emerging field of application, its security problem has also become a researched focus. This paper introduces the architecture and the application advantages of WSN, and points out its security flaws. According to various kinds of attacks in wireless sensor networks, the author made a comprehensive analysis and put forward the design of security architecture of WSN and the corresponding specific defense means.","PeriodicalId":196962,"journal":{"name":"2015 Seventh International Conference on Measuring Technology and Mechatronics Automation","volume":"69 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 Seventh International Conference on Measuring Technology and Mechatronics Automation","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICMTMA.2015.310","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 10
Abstract
As wireless sensor network (WSN) become an emerging field of application, its security problem has also become a researched focus. This paper introduces the architecture and the application advantages of WSN, and points out its security flaws. According to various kinds of attacks in wireless sensor networks, the author made a comprehensive analysis and put forward the design of security architecture of WSN and the corresponding specific defense means.