Security and Trust in Sensor Networks

作者: Przemysław Błaśkiewicz , Mirosław Kutyłowski

DOI: 10.1007/978-3-642-14849-1_22

关键词:

摘要: The concept of security for tiny artifacts has been studied in a wide range aspects, from authentication through data integrity to intrusion detection. This chapter provides broad overview some the techniques developed constrained devices where computational power, memory capacity, and energy limitations enforce slightly different approaches these problems, when compared standard high-end devices. In following, we present ideas that leverage unique properties sensor networks (also wireless networks) provide consistent secure systems information gathering sensing.

参考文章(55)
Matthias Krause, Dirk Stegemann, More on the Security of Linear RFID Authentication Protocols Selected Areas in Cryptography. ,vol. 5867, pp. 182- 196 ,(2009) , 10.1007/978-3-642-05445-7_12
Miroslaw Kutylowski, Marek Klonowski, Michal Koza, Security Challenges for Wireless Sensor Networks. Ercim News. ,vol. 2009, ,(2009)
Wen Hu, Peter Corke, Wen Chan Shih, Leslie Overs, secFleck: A Public Key Technology Platform for Wireless Sensor Networks international conference on embedded wireless systems and networks. pp. 296- 311 ,(2009) , 10.1007/978-3-642-00224-3_19
Adrian Perrig, JD Tygar, Adrian Perrig, JD Tygar, None, TESLA Broadcast Authentication Springer, Boston, MA. pp. 29- 53 ,(2003) , 10.1007/978-1-4615-0229-6_3
Jens Bender, Marc Fischlin, Dennis Kügler, Security Analysis of the PACE Key-Agreement Protocol international conference on information security. pp. 33- 48 ,(2009) , 10.1007/978-3-642-04474-8_3
Daniele Micciancio, S. Goldwasser, Complexity of lattice problems ,(2002)
Jacek Cichoń, Marek Klonowski, Mirosław Kutyłowski, Privacy Protection for RFID with Hidden Subset Identifiers international conference on pervasive computing. pp. 298- 314 ,(2009) , 10.1007/978-3-540-79576-6_18
Aggelos Kiayias, Moti Yung, Polynomial reconstruction based cryptography selected areas in cryptography. pp. 129- 133 ,(2001) , 10.1007/3-540-45537-X_10
Nicholas J. Hopper, Manuel Blum, Secure Human Identification Protocols international conference on the theory and application of cryptology and information security. pp. 52- 66 ,(2001) , 10.1007/3-540-45682-1_4
Michał Ren, Tanmoy Kanti Das, Jianying, Diverging Keys in Wireless Sensor Networks Lecture Notes in Computer Science. pp. 257- 269 ,(2006) , 10.1007/11836810_19