{"title":"Advances in sensor and ad-hoc network security: perspective and status","authors":"V. Gligor","doi":"10.1145/1102219.1102231","DOIUrl":null,"url":null,"abstract":"During the past five years we have witnessed significant advances in sensor and ad-hoc network technologies. Security concerns have been the focus in much research, and yet few of the many interesting ideas that have been published to date have found direct application in real sensor and ad-hoc networks. While this is not an unusual state for security research, this panel will provide a \"reality check.\" In particular, it will assess the state of the art in sensor and ad-hoc network security, provide a view of what can be expected in research and practice within the next five years, and suggest an number of research topics beyond the well-established areas of secure routing and key management.","PeriodicalId":380051,"journal":{"name":"ACM Workshop on Security of ad hoc and Sensor Networks","volume":"6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"ACM Workshop on Security of ad hoc and Sensor Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/1102219.1102231","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
During the past five years we have witnessed significant advances in sensor and ad-hoc network technologies. Security concerns have been the focus in much research, and yet few of the many interesting ideas that have been published to date have found direct application in real sensor and ad-hoc networks. While this is not an unusual state for security research, this panel will provide a "reality check." In particular, it will assess the state of the art in sensor and ad-hoc network security, provide a view of what can be expected in research and practice within the next five years, and suggest an number of research topics beyond the well-established areas of secure routing and key management.