{"title":"安全关键型无线传感器网络的安全服务与管理","authors":"Qiang Liu, Li Liu, Xiaohui Kuang, Yan Wen","doi":"10.1109/IMIS.2012.94","DOIUrl":null,"url":null,"abstract":"For Security-Critical Wireless Sensor Network (SCWSN), security should be given priority in design. In this paper, we analyze the essential security demands for security-critical WSN. Then, we propose our integrated approaches, which are built based on security service and management, to achieve security for security-critical WSN. Finally, we describe how our security solution works against typical attacks. There are four advantage characters to provide against attacks in the SCWSN we designed: feather-weight public key and share key combined key pre-distribution scheme, hop by hop packet signature and encryption in the route path, remote management of nodes and network route, data confidence analysis.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"24 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Secure Service and Management for Security-Critical Wireless Sensor Network\",\"authors\":\"Qiang Liu, Li Liu, Xiaohui Kuang, Yan Wen\",\"doi\":\"10.1109/IMIS.2012.94\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"For Security-Critical Wireless Sensor Network (SCWSN), security should be given priority in design. In this paper, we analyze the essential security demands for security-critical WSN. Then, we propose our integrated approaches, which are built based on security service and management, to achieve security for security-critical WSN. Finally, we describe how our security solution works against typical attacks. There are four advantage characters to provide against attacks in the SCWSN we designed: feather-weight public key and share key combined key pre-distribution scheme, hop by hop packet signature and encryption in the route path, remote management of nodes and network route, data confidence analysis.\",\"PeriodicalId\":290976,\"journal\":{\"name\":\"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing\",\"volume\":\"24 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-07-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IMIS.2012.94\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IMIS.2012.94","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Secure Service and Management for Security-Critical Wireless Sensor Network
For Security-Critical Wireless Sensor Network (SCWSN), security should be given priority in design. In this paper, we analyze the essential security demands for security-critical WSN. Then, we propose our integrated approaches, which are built based on security service and management, to achieve security for security-critical WSN. Finally, we describe how our security solution works against typical attacks. There are four advantage characters to provide against attacks in the SCWSN we designed: feather-weight public key and share key combined key pre-distribution scheme, hop by hop packet signature and encryption in the route path, remote management of nodes and network route, data confidence analysis.