{"title":"一种提高无线传感器网络安全性的方法","authors":"T. Thenmozhi, R. Somasundaram","doi":"10.1109/ICCCNT.2012.6395920","DOIUrl":null,"url":null,"abstract":"Wireless sensor networks are of a large number of low cost resource constrained sensor nodes. Each node has to sense certain phenomena and forward its data towards a central node, which is also called the base station. The range of applications include basic data reading like temperature to a wide variety of applications including agriculture. A large amount of work has happened into the design and analysis of the sensor devices. These sensor can handle high level of data exchange without reduction in performance. The data to be exchanged are of vital importance and need to be handled with high level of confidentiality. Though there are security algorithms that offers mechanisms for data confidentiality there is a rising need for improvement for better level of security. The hackers can be from node level to process level. This paper outlines the different security issues in wireless sensor network and provides scope for improvement.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Towards an approach for improved security in wireless sensor networks\",\"authors\":\"T. Thenmozhi, R. Somasundaram\",\"doi\":\"10.1109/ICCCNT.2012.6395920\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Wireless sensor networks are of a large number of low cost resource constrained sensor nodes. Each node has to sense certain phenomena and forward its data towards a central node, which is also called the base station. The range of applications include basic data reading like temperature to a wide variety of applications including agriculture. A large amount of work has happened into the design and analysis of the sensor devices. These sensor can handle high level of data exchange without reduction in performance. The data to be exchanged are of vital importance and need to be handled with high level of confidentiality. Though there are security algorithms that offers mechanisms for data confidentiality there is a rising need for improvement for better level of security. The hackers can be from node level to process level. This paper outlines the different security issues in wireless sensor network and provides scope for improvement.\",\"PeriodicalId\":364589,\"journal\":{\"name\":\"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-07-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCCNT.2012.6395920\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCNT.2012.6395920","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Towards an approach for improved security in wireless sensor networks
Wireless sensor networks are of a large number of low cost resource constrained sensor nodes. Each node has to sense certain phenomena and forward its data towards a central node, which is also called the base station. The range of applications include basic data reading like temperature to a wide variety of applications including agriculture. A large amount of work has happened into the design and analysis of the sensor devices. These sensor can handle high level of data exchange without reduction in performance. The data to be exchanged are of vital importance and need to be handled with high level of confidentiality. Though there are security algorithms that offers mechanisms for data confidentiality there is a rising need for improvement for better level of security. The hackers can be from node level to process level. This paper outlines the different security issues in wireless sensor network and provides scope for improvement.