Security in Next-Generation Wireless Sensor Networks
- 10.2991/csss-14.2014.119How to use a DOI?
- Wireless Sensor Networks; security; attack; application; structure;
Wireless Sensor Networks (WSNs) have been widely used in various applications. Recent advances in micro-electro-mechanical systems (MEMS) technology have enabled the development of WSN. Hardware constraints and application scenarios lead to safety problems become important problem that restrict the development of the next generation of WSN. Appropriate security guarantee protocols have been proposed to address various security problems. But, if only cumulate security protocols to sensor nodes will make it increasingly difficult to pay costs to establish and maintain WSN. For existing security problems in network layer, we analyze from the following three aspects: i. Application model classification. Security goals and attack overcome are not same magnitude in different models. ii. Several attacks integrated implementation were adopted by Adversary, to obtain valuable informations. iii. We proposed a security dependence principle presence in WSN, which widely used in object-oriented programming. Extract high-level security abstractions which be depended by specific safety problems, i.e. Clone attack, wormhole attack. We describe relationships and structures of security dependence in several common attacks.
- © 2014, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Cite this article
TY - CONF AU - Gao Lijie AU - Chen Zhigang PY - 2014/06 DA - 2014/06 TI - Security in Next-Generation Wireless Sensor Networks BT - Proceedings of the 3rd International Conference on Computer Science and Service System PB - Atlantis Press SP - 508 EP - 511 SN - 1951-6851 UR - https://doi.org/10.2991/csss-14.2014.119 DO - 10.2991/csss-14.2014.119 ID - Lijie2014/06 ER -