Abstract
Security issue of sensor networks is greatly different from that of conventional networks. In this paper, the characteristics analysis of wireless sensor network(WSN) has been carried out firstly, through analysis, the security architecture of sensor networks is proposed, trying to outline a general illustration on this area, and then security defense on the wireless sensor network security issues has been implemented secondly, finally the pairwise keying algorithm has been described and analyzed ,from above all, the ultimate security solution of wireless sensor network has been proposed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.: SPINS: Security protocols for sensor networks. In: Proc. of the 7th Annual Int’l Conf. on Mobile Computing and Networks, pp. 189–199. ACM Press, Rome (2001)
Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: A survey. Computer Networks 38(4), 393–422 (2002)
Zhu, S., Setia, S., Jajodia, S.: LEAP: Efficient security mechanisms for large-scale distributed sensor networks. In: Proc. of the 10th ACM Conf. on Computer and Communications Security (CCS 2003), Washington, D.C, pp. 62–72 (2003)
Deng, J., Han, R., Mishra, S.: Defending against path-based DoS attacks in wireless sensor networks. In: Proc. ACM Workshop on Security of Ad Hoc and Sensor Networks, SASN, 2005, pp. 89–96 (2005)
Manzo, M., Roosta, T.: Time synchronization attacks in sensor networks. In: Proc. ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2005), pp. 107–116 (2005)
Zhang, W., Cao, G.: Group rekeying for filtering false data in sensor networks: A predistribution and local collaboration-based approach, http://www.cse.psu.edu/~wezhang/papers/paper-infocom05.pdf
Malan, D.J., Welsh, M., Smith, M.D.: A public-key infrastructure for key distribution in Ting OS based on elliptic curve cryptography, http://airclic.eecs.harvard.edu/publications/secon04.pdf
Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: Proc. of the IEEE Symp. on Research in Security and Privacy, pp. 197–213. IEEE Computer Society, Oakland (2003)
Du, W.L., Wang, R.H., Ning, P.: An efficient scheme for authenticating public keys in sensor networks. In: Proc. of the 6th ACM Int’l Symp. on Mobile Ad Hoc Networking and Computing (MobiHoc 2005), pp. 58–67. ACM Press, Urbana-Champaign (2005)
Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proc. of the 9th ACM Conf. on Computer and Communications Security, pp. 41–47. ACM Press, Washington DC (2002)
Chadha, A., Liu, Y., Das, S.K.: Group key distribution via local collaboration in wireless sensor networks. In: Proc. IEEE SECON 2005, pp. 46–54 (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bin, L., Long, W., Guo-Feng, Z. (2011). Search on Security of Wireless Sensor Network in Facilities on Sports Venues. In: Zeng, D. (eds) Applied Informatics and Communication. ICAIC 2011. Communications in Computer and Information Science, vol 224. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23214-5_55
Download citation
DOI: https://doi.org/10.1007/978-3-642-23214-5_55
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-23213-8
Online ISBN: 978-3-642-23214-5
eBook Packages: Computer ScienceComputer Science (R0)