{"title":"传感器网络安全的逐步适应","authors":"A. Taddeo, Laura Micconi, A. Ferrante","doi":"10.1109/WOWMOM.2010.5534903","DOIUrl":null,"url":null,"abstract":"Wireless sensor networks are composed of nodes with stringent constraints on resources. Some of this devices may have the possibility to recharge batteries (e.g., by means of solar panels); though, a reduced power consumption is anyway a key factor when recharge resources are not available (e.g., during the night for solar panels). In this paper we describe a method for security self-adaptation tailed for wireless sensor networks. This method allows devices to adapt security of applications gradually with the goal of guaranteeing the maximum possible level of security while satisfying power constraints. A case study, implemented on Sun SPOTs, is also presented to show how the method works in a real wireless sensor network.","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"17","resultStr":"{\"title\":\"Gradual adaptation of security for sensor networks\",\"authors\":\"A. Taddeo, Laura Micconi, A. Ferrante\",\"doi\":\"10.1109/WOWMOM.2010.5534903\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Wireless sensor networks are composed of nodes with stringent constraints on resources. Some of this devices may have the possibility to recharge batteries (e.g., by means of solar panels); though, a reduced power consumption is anyway a key factor when recharge resources are not available (e.g., during the night for solar panels). In this paper we describe a method for security self-adaptation tailed for wireless sensor networks. This method allows devices to adapt security of applications gradually with the goal of guaranteeing the maximum possible level of security while satisfying power constraints. A case study, implemented on Sun SPOTs, is also presented to show how the method works in a real wireless sensor network.\",\"PeriodicalId\":384628,\"journal\":{\"name\":\"2010 IEEE International Symposium on \\\"A World of Wireless, Mobile and Multimedia Networks\\\" (WoWMoM)\",\"volume\":\"12 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-06-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"17\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 IEEE International Symposium on \\\"A World of Wireless, Mobile and Multimedia Networks\\\" (WoWMoM)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/WOWMOM.2010.5534903\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WOWMOM.2010.5534903","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Gradual adaptation of security for sensor networks
Wireless sensor networks are composed of nodes with stringent constraints on resources. Some of this devices may have the possibility to recharge batteries (e.g., by means of solar panels); though, a reduced power consumption is anyway a key factor when recharge resources are not available (e.g., during the night for solar panels). In this paper we describe a method for security self-adaptation tailed for wireless sensor networks. This method allows devices to adapt security of applications gradually with the goal of guaranteeing the maximum possible level of security while satisfying power constraints. A case study, implemented on Sun SPOTs, is also presented to show how the method works in a real wireless sensor network.