Information Security in Wireless Sensor Networks
dc.contributor.author | Ouadjaout, Abdelraouf | |
dc.contributor.author | Bagaa, Miloud | |
dc.contributor.author | Bachir, Abdelmalik | |
dc.contributor.author | Challal, Yacine | |
dc.contributor.author | Lasla, Noureddine | |
dc.contributor.author | Khelladi, Lyes | |
dc.date.accessioned | 2013-06-05T15:48:03Z | |
dc.date.available | 2013-06-05T15:48:03Z | |
dc.date.issued | 2009-10 | |
dc.description.abstract | In this chapter, we provide a comprehensive survey of security issues in wireless sensor networks. We show that the main features of WSNs, namely their limited resources, wireless communications, and close physical coupling with environment, are the main causes of the their security vulnerabilities. We discuss the main attacks stemming from these vulnerabilities, along with the solutions proposed in the literature to cope with them. The security solutions are analyzed with respect to the different layers of the network protocol stack and cover the following issues: Key management, secure data dissemination, secure data aggregation, secure channel access and secure node compromise. | fr_FR |
dc.identifier.isbn | 978-981-283-348-8 | |
dc.identifier.uri | http://dl.cerist.dz/handle/CERIST/160 | |
dc.publisher | World Scientific | fr_FR |
dc.relation.ispartof | Encyclopedia On Ad Hoc And Ubiquitous Computing | |
dc.relation.ispartofseries | Encyclopedia On Ad Hoc And Ubiquitous Computing | fr_FR |
dc.structure | Réseaux de Capteurs et Applications | fr_FR |
dc.subject | security | fr_FR |
dc.subject | sensor | fr_FR |
dc.subject | wireless | fr_FR |
dc.title | Information Security in Wireless Sensor Networks | fr_FR |
dc.type | Book Chapter |