{"title":"Securing Wireless Sensor Network based solutions","authors":"R. Nallusamy, V. Varadharajan, S. K. Vuppala","doi":"10.1109/WICT.2012.6409144","DOIUrl":null,"url":null,"abstract":"Wireless Sensor Network (WSN) based systems are becoming mainstream and are getting deployed in critical business environments. Thus, any failure of such a system due to potential security attacks would have serious business implications for an enterprise. So far the community has looked into the security of WSN in isolation and to our knowledge there is no study looking into end-to-end security issues of a WSN based business solution, such as, datacenter monitoring. This paper provides an insight into the security issues in the deployment of WSN based solutions and briefly outlines the possible security measures that can be applied.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 World Congress on Information and Communication Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WICT.2012.6409144","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Wireless Sensor Network (WSN) based systems are becoming mainstream and are getting deployed in critical business environments. Thus, any failure of such a system due to potential security attacks would have serious business implications for an enterprise. So far the community has looked into the security of WSN in isolation and to our knowledge there is no study looking into end-to-end security issues of a WSN based business solution, such as, datacenter monitoring. This paper provides an insight into the security issues in the deployment of WSN based solutions and briefly outlines the possible security measures that can be applied.