TITLE

Kablosuz Algılayıcı Ağlarında Güvenlik: Sorunlar ve Çözümler

AUTHOR(S)
Meghdadi, Majid; Özdemir, Suat; Güler, Inan
PUB. DATE
January 2008
SOURCE
International Journal of InformaticsTechnologies;2008, Vol. 1 Issue 1, p35
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
The recent advances in low-power integrated circuits and wireless communications have enabled Wireless Sensor Networks (WSNs) to be used in many activities such as surveillance and tracking. Due to their unattended nature and resource-constrained sensor nodes, however, WSNs are extremely vulnerable to any kind of internal or external security attacks. Especially for military applications where usually security sensitive data are carried over, there is a tremendous need for security mechanisms that ensure data confidentiality and integrity. In addition, because of the unique properties of WSNs, these security mechanisms must be developed during system design process. In this paper, we survey the "state-of-the-art" in WSN security and present the obstacles and requirements.
ACCESSION #
35648444

 

Related Articles

  • Intelligent Security System with Wireless Sensors. Shrikeerthana, R.; Balamurugan, A. // International Journal of Computer Applications;2012, Vol. 60, p21 

    Wireless sensor networks emphasize in most of the real world applications such as military applications, medical field and home appliances and so on. Sensors used in such applications do not provide any confidentiality, however it is been used in almost all the areas in our day-to-day life....

  • Critical Infrastructure Surveillance Using Secure Wireless Sensor Networks. Niedermeier, Michael; Xiaobing He; de Meer, Hermann; Buschmann, Carsten; Hartmann, Klaus; Langmann, Benjamin; Koch, Michael; Fischer, Stefan; Pfisterer, Dennis // Journal of Sensor & Actuator Networks;2015, Vol. 4 Issue 4, p336 

    In this work, a secure wireless sensor network (WSN) for the surveillance, monitoring and protection of critical infrastructures was developed. To guarantee the security of the system, the main focus was the implementation of a unique security concept, which includes both security on the...

  • The impending explosion. Douglas, Merrill // Urgent Communications;Jan2010, Vol. 28 Issue 1, p12 

    The article explores the numerous technologies that are benefiting the surveillance and security market. The bandwidth requirement of surveillance systems in wireless networks are being addressed by the utilization of high definition video cameras with megapixel resolutions that offer clear...

  • Simulation Model of Wireless Technology for Bridge Girder Monitoring. Hassan, M. K.; Zain, M. F. M.; Hannan, M. A; Jamil, M. // Australian Journal of Basic & Applied Sciences;2011, Vol. 5 Issue 3, p731 

    The paper deals the simulation model of the wireless sensor technology for monitoring the bridge girder. The main components of the wireless sensor technology are sensor, transmitter and receiver. The sensors are used to measure the structural behavior measurement parameters such as...

  • Wireless Sensor Networks for Smart Grid Applications: A Case Study on Link Reliability and Node Lifetime Evaluations in Power Distribution Systems. Tuna, Gurkan; Gungor, V. Cagri; Gulez, Kayhan // International Journal of Distributed Sensor Networks;2013, p1 

    Recent advances in embedded systems and wireless sensor networks (WSNs) made it possible to realize low-cost monitoring and automation systems for smart grids. This paper presents opportunities and design challenges of WSNs for smart grid applications. WSN-based smart grid applications have been...

  • A key pre-distribution scheme for wireless sensor networks: merging blocks in combinatorial design. Chakrabarti, Dibyendu; Maitra, Subhamoy; Roy, Bimal // International Journal of Information Security;2006, Vol. 5 Issue 2, p105 

    In this paper, combinatorial design followed by randomized merging strategy is applied to key pre-distribution in sensor nodes. A transversal design is used to construct a ( v, b, r, k) configuration and then randomly selected blocks are merged to form the sensor nodes. We present detailed...

  • Myriad Uses for Remote Video Surveillance.  // SDM: Security Distributing & Marketing;Oct2005, Vol. 35 Issue 10, p52 

    Cites the different uses for remote video surveillance systems in the United States. Incorporation of video cameras into motion detectors; Examples where wireless communications send an alarm and video clip to a central station; Use of remote video systems in exception-based reporting and...

  • Maximizing Data Extraction in Energy-Limited Sensor Networks. Sadagopan, Narayanan; Krishnamachari, Bhaskar // International Journal of Distributed Sensor Networks;2005, Vol. 1 Issue 1, p123 

    We examine the problem of maximizing data collection from an energy-limited store-and-extract wireless sensor network, which is analogous to the maximum lifetime problem of interest in continuous data-gathering sensor networks. One significant difference is that this problem requires attention...

  • Suppressing Temporal Data in Sensor Networks using a Scheme Robust to Aberrant Readings. Reis, Ilka A.; Câmara, Gilberto; Assunção, Renato; Monteiro, Antônio Miguel V. // International Journal of Distributed Sensor Networks;Nov/Dec2009, Vol. 5 Issue 6, p771 

    The main goal of a data collection protocol for sensor networks is to keep the network's database updated while saving the nodes' energy as much as possible. To achieve this goal without continuous reporting, data suppression is a key strategy. The basic idea behind data suppression schemes is...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics