{"title":"传感器网络中使用非对称和对称混合方法的端到端数据安全。","authors":"H. Alzaid, M. Alfaraj","doi":"10.1109/NTMS.2008.ECP.59","DOIUrl":null,"url":null,"abstract":"Wireless sensor networks (WSNs) are a new technology that is expected to be used increasingly in the near future due to its cheap cost and data processing ability. However, securing WSNs is a complicated issue since the chosen security scheme should offer data security requirements such as data integrity, confidentiality, authentication, and availability although of the existed resource constraints in the sensors. In this paper, we describe the design of securing end-to-end data in WSNs using a mixture of asymmetric and symmetric approaches (MASA) that improves the security level offered by similar schemes and reduces the resources consumptions.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"28 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":"{\"title\":\"MASA: End-to-End Data Security in Sensor Networks Using a Mix of Asymmetric and Symmetric Approaches.\",\"authors\":\"H. Alzaid, M. Alfaraj\",\"doi\":\"10.1109/NTMS.2008.ECP.59\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Wireless sensor networks (WSNs) are a new technology that is expected to be used increasingly in the near future due to its cheap cost and data processing ability. However, securing WSNs is a complicated issue since the chosen security scheme should offer data security requirements such as data integrity, confidentiality, authentication, and availability although of the existed resource constraints in the sensors. In this paper, we describe the design of securing end-to-end data in WSNs using a mixture of asymmetric and symmetric approaches (MASA) that improves the security level offered by similar schemes and reduces the resources consumptions.\",\"PeriodicalId\":432307,\"journal\":{\"name\":\"2008 New Technologies, Mobility and Security\",\"volume\":\"28 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-11-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"10\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 New Technologies, Mobility and Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/NTMS.2008.ECP.59\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 New Technologies, Mobility and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NTMS.2008.ECP.59","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
MASA: End-to-End Data Security in Sensor Networks Using a Mix of Asymmetric and Symmetric Approaches.
Wireless sensor networks (WSNs) are a new technology that is expected to be used increasingly in the near future due to its cheap cost and data processing ability. However, securing WSNs is a complicated issue since the chosen security scheme should offer data security requirements such as data integrity, confidentiality, authentication, and availability although of the existed resource constraints in the sensors. In this paper, we describe the design of securing end-to-end data in WSNs using a mixture of asymmetric and symmetric approaches (MASA) that improves the security level offered by similar schemes and reduces the resources consumptions.