{"title":"无线传感器网络的加密技术:综述","authors":"Aiman Faquih, Priya U. Kadam, Zia U H. Saquib","doi":"10.1109/IBSS.2015.7456652","DOIUrl":null,"url":null,"abstract":"The world is approaching towards more promising application of wireless communication and electronics has enabled the development of low-cost sensor networks. Wireless Sensor Networks (WSNs) has vast range of applications but as the sensor network becomes more complex, security of these WSN becomes even more important. WSN faces major security threats due to deployment of sensors in remote area and its geographical distributions. This has led the researchers to explore solution in this emerging area. In this paper, key aspect for the WSN security is discussed. Various cryptography techniques are studied such as symmetric key and public key which further contains Elliptic Curve Cryptography (ECC), Pair based Cryptography (PBC) and Identity Based Cryptography (IBC).","PeriodicalId":317804,"journal":{"name":"2015 IEEE Bombay Section Symposium (IBSS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":"{\"title\":\"Cryptographic techniques for wireless sensor networks: A survey\",\"authors\":\"Aiman Faquih, Priya U. Kadam, Zia U H. Saquib\",\"doi\":\"10.1109/IBSS.2015.7456652\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The world is approaching towards more promising application of wireless communication and electronics has enabled the development of low-cost sensor networks. Wireless Sensor Networks (WSNs) has vast range of applications but as the sensor network becomes more complex, security of these WSN becomes even more important. WSN faces major security threats due to deployment of sensors in remote area and its geographical distributions. This has led the researchers to explore solution in this emerging area. In this paper, key aspect for the WSN security is discussed. Various cryptography techniques are studied such as symmetric key and public key which further contains Elliptic Curve Cryptography (ECC), Pair based Cryptography (PBC) and Identity Based Cryptography (IBC).\",\"PeriodicalId\":317804,\"journal\":{\"name\":\"2015 IEEE Bombay Section Symposium (IBSS)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"10\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 IEEE Bombay Section Symposium (IBSS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IBSS.2015.7456652\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 IEEE Bombay Section Symposium (IBSS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IBSS.2015.7456652","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Cryptographic techniques for wireless sensor networks: A survey
The world is approaching towards more promising application of wireless communication and electronics has enabled the development of low-cost sensor networks. Wireless Sensor Networks (WSNs) has vast range of applications but as the sensor network becomes more complex, security of these WSN becomes even more important. WSN faces major security threats due to deployment of sensors in remote area and its geographical distributions. This has led the researchers to explore solution in this emerging area. In this paper, key aspect for the WSN security is discussed. Various cryptography techniques are studied such as symmetric key and public key which further contains Elliptic Curve Cryptography (ECC), Pair based Cryptography (PBC) and Identity Based Cryptography (IBC).