Search on Security of Wireless Sensor Network in Facilities on Sports Venues | SpringerLink
Skip to main content

Search on Security of Wireless Sensor Network in Facilities on Sports Venues

  • Conference paper
Applied Informatics and Communication (ICAIC 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 224))

Included in the following conference series:

  • 1834 Accesses

Abstract

Security issue of sensor networks is greatly different from that of conventional networks. In this paper, the characteristics analysis of wireless sensor network(WSN) has been carried out firstly, through analysis, the security architecture of sensor networks is proposed, trying to outline a general illustration on this area, and then security defense on the wireless sensor network security issues has been implemented secondly, finally the pairwise keying algorithm has been described and analyzed ,from above all, the ultimate security solution of wireless sensor network has been proposed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 11439
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 14299
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.: SPINS: Security protocols for sensor networks. In: Proc. of the 7th Annual Int’l Conf. on Mobile Computing and Networks, pp. 189–199. ACM Press, Rome (2001)

    Google Scholar 

  2. Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: A survey. Computer Networks 38(4), 393–422 (2002)

    Article  Google Scholar 

  3. Zhu, S., Setia, S., Jajodia, S.: LEAP: Efficient security mechanisms for large-scale distributed sensor networks. In: Proc. of the 10th ACM Conf. on Computer and Communications Security (CCS 2003), Washington, D.C, pp. 62–72 (2003)

    Google Scholar 

  4. Deng, J., Han, R., Mishra, S.: Defending against path-based DoS attacks in wireless sensor networks. In: Proc. ACM Workshop on Security of Ad Hoc and Sensor Networks, SASN, 2005, pp. 89–96 (2005)

    Google Scholar 

  5. Manzo, M., Roosta, T.: Time synchronization attacks in sensor networks. In: Proc. ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2005), pp. 107–116 (2005)

    Google Scholar 

  6. Zhang, W., Cao, G.: Group rekeying for filtering false data in sensor networks: A predistribution and local collaboration-based approach, http://www.cse.psu.edu/~wezhang/papers/paper-infocom05.pdf

  7. Malan, D.J., Welsh, M., Smith, M.D.: A public-key infrastructure for key distribution in Ting OS based on elliptic curve cryptography, http://airclic.eecs.harvard.edu/publications/secon04.pdf

  8. Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: Proc. of the IEEE Symp. on Research in Security and Privacy, pp. 197–213. IEEE Computer Society, Oakland (2003)

    Google Scholar 

  9. Du, W.L., Wang, R.H., Ning, P.: An efficient scheme for authenticating public keys in sensor networks. In: Proc. of the 6th ACM Int’l Symp. on Mobile Ad Hoc Networking and Computing (MobiHoc 2005), pp. 58–67. ACM Press, Urbana-Champaign (2005)

    Chapter  Google Scholar 

  10. Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proc. of the 9th ACM Conf. on Computer and Communications Security, pp. 41–47. ACM Press, Washington DC (2002)

    Google Scholar 

  11. Chadha, A., Liu, Y., Das, S.K.: Group key distribution via local collaboration in wireless sensor networks. In: Proc. IEEE SECON 2005, pp. 46–54 (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bin, L., Long, W., Guo-Feng, Z. (2011). Search on Security of Wireless Sensor Network in Facilities on Sports Venues. In: Zeng, D. (eds) Applied Informatics and Communication. ICAIC 2011. Communications in Computer and Information Science, vol 224. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23214-5_55

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-23214-5_55

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-23213-8

  • Online ISBN: 978-3-642-23214-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics