{"title":"无线传感器网络的安全模型","authors":"H. Marzi, Arash Marzi","doi":"10.1109/CIVEMSA.2014.6841440","DOIUrl":null,"url":null,"abstract":"Until recently use of sensors to collect sensitive parameters had only few risk factors such as sensor malfunction, uncertainty of data collection, or missing data coverage. Some issues in these categories were addressed by multi-sensor application or sensor fusion. However, advancement in technology and advent of wireless sensors in a networked environment, brought along a new risk factor related to the security in wireless sensor network. Therefore security in Wireless Sensor Network WSNs is challenging and critical to the functionality of the networked sensors. This is very important in cases of highly secure environment, especially in industrial, military, and medical domains. The standard WSN protocols focus on energy efficiency; transmission efficiency, and routing. WSN is known for limitations on hardware and software and for resources-constrained in general. An adaptive model of security that meets requirements and constraints in WSN is Intrusion Detections. This article investigates security in WSN and presents a design process for achieving optimum security based on requirements and constraints in WSNs. Further, comparative results between a proposed technique and other security current approaches are discussed.","PeriodicalId":228132,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Virtual Environments for Measurement Systems and Applications (CIVEMSA)","volume":"201 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"17","resultStr":"{\"title\":\"A security model for wireless sensor networks\",\"authors\":\"H. Marzi, Arash Marzi\",\"doi\":\"10.1109/CIVEMSA.2014.6841440\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Until recently use of sensors to collect sensitive parameters had only few risk factors such as sensor malfunction, uncertainty of data collection, or missing data coverage. Some issues in these categories were addressed by multi-sensor application or sensor fusion. However, advancement in technology and advent of wireless sensors in a networked environment, brought along a new risk factor related to the security in wireless sensor network. Therefore security in Wireless Sensor Network WSNs is challenging and critical to the functionality of the networked sensors. This is very important in cases of highly secure environment, especially in industrial, military, and medical domains. The standard WSN protocols focus on energy efficiency; transmission efficiency, and routing. WSN is known for limitations on hardware and software and for resources-constrained in general. An adaptive model of security that meets requirements and constraints in WSN is Intrusion Detections. This article investigates security in WSN and presents a design process for achieving optimum security based on requirements and constraints in WSNs. Further, comparative results between a proposed technique and other security current approaches are discussed.\",\"PeriodicalId\":228132,\"journal\":{\"name\":\"2014 IEEE International Conference on Computational Intelligence and Virtual Environments for Measurement Systems and Applications (CIVEMSA)\",\"volume\":\"201 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-05-05\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"17\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 IEEE International Conference on Computational Intelligence and Virtual Environments for Measurement Systems and Applications (CIVEMSA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CIVEMSA.2014.6841440\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 IEEE International Conference on Computational Intelligence and Virtual Environments for Measurement Systems and Applications (CIVEMSA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CIVEMSA.2014.6841440","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Until recently use of sensors to collect sensitive parameters had only few risk factors such as sensor malfunction, uncertainty of data collection, or missing data coverage. Some issues in these categories were addressed by multi-sensor application or sensor fusion. However, advancement in technology and advent of wireless sensors in a networked environment, brought along a new risk factor related to the security in wireless sensor network. Therefore security in Wireless Sensor Network WSNs is challenging and critical to the functionality of the networked sensors. This is very important in cases of highly secure environment, especially in industrial, military, and medical domains. The standard WSN protocols focus on energy efficiency; transmission efficiency, and routing. WSN is known for limitations on hardware and software and for resources-constrained in general. An adaptive model of security that meets requirements and constraints in WSN is Intrusion Detections. This article investigates security in WSN and presents a design process for achieving optimum security based on requirements and constraints in WSNs. Further, comparative results between a proposed technique and other security current approaches are discussed.