{"title":"无线传感器网络安全协议分析","authors":"Khudoykulov Zarif Turakulovich, Shirinov Laziz Tokhirovich","doi":"10.1109/ICISCT47635.2019.9012015","DOIUrl":null,"url":null,"abstract":"Nowadays, Wireless Sensor Networks are being used in area monitoring, health care monitoring, environmental/earth sensing, industrial monitoring and therefore security of these networks is becoming a central concern. Wireless Sensor Networks consists of low power, low-cost smart devices that have limited computing resources against current devices, like personal computer. This paper discusses overall constraints, security requirements, security threats, typical attacks and their defensive techniques or countermeasures relevant to the sensor networks. Besides that, best practical suggestions are given to improve current security mechanisms on Wireless Sensor Network.","PeriodicalId":170576,"journal":{"name":"2019 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Analysis of Security Protocols in Wireless Sensor Networks\",\"authors\":\"Khudoykulov Zarif Turakulovich, Shirinov Laziz Tokhirovich\",\"doi\":\"10.1109/ICISCT47635.2019.9012015\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Nowadays, Wireless Sensor Networks are being used in area monitoring, health care monitoring, environmental/earth sensing, industrial monitoring and therefore security of these networks is becoming a central concern. Wireless Sensor Networks consists of low power, low-cost smart devices that have limited computing resources against current devices, like personal computer. This paper discusses overall constraints, security requirements, security threats, typical attacks and their defensive techniques or countermeasures relevant to the sensor networks. Besides that, best practical suggestions are given to improve current security mechanisms on Wireless Sensor Network.\",\"PeriodicalId\":170576,\"journal\":{\"name\":\"2019 International Conference on Information Science and Communications Technologies (ICISCT)\",\"volume\":\"15 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 International Conference on Information Science and Communications Technologies (ICISCT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICISCT47635.2019.9012015\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 International Conference on Information Science and Communications Technologies (ICISCT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICISCT47635.2019.9012015","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Analysis of Security Protocols in Wireless Sensor Networks
Nowadays, Wireless Sensor Networks are being used in area monitoring, health care monitoring, environmental/earth sensing, industrial monitoring and therefore security of these networks is becoming a central concern. Wireless Sensor Networks consists of low power, low-cost smart devices that have limited computing resources against current devices, like personal computer. This paper discusses overall constraints, security requirements, security threats, typical attacks and their defensive techniques or countermeasures relevant to the sensor networks. Besides that, best practical suggestions are given to improve current security mechanisms on Wireless Sensor Network.