{"title":"无线传感器网络脆弱性分析","authors":"P. S. Zhukovskyy","doi":"10.31673/2409-7292.2021.045963","DOIUrl":null,"url":null,"abstract":"The analysis of the problem of cybersecurity of wireless sensor networks is carried out in the work, the purpose and tasks of management of protection of wireless sensor networks are defined. The purpose of security of sensor networks is defined. The analysis of vulnerabilities of wireless sensor networks is carried out. Based on the research conducted in the work, recommendations for the use of technology to manage their protection at the enterprise have been developed.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"185 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Vulnerability analysis of wireless sensor networks\",\"authors\":\"P. S. Zhukovskyy\",\"doi\":\"10.31673/2409-7292.2021.045963\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The analysis of the problem of cybersecurity of wireless sensor networks is carried out in the work, the purpose and tasks of management of protection of wireless sensor networks are defined. The purpose of security of sensor networks is defined. The analysis of vulnerabilities of wireless sensor networks is carried out. Based on the research conducted in the work, recommendations for the use of technology to manage their protection at the enterprise have been developed.\",\"PeriodicalId\":107068,\"journal\":{\"name\":\"Modern information security\",\"volume\":\"185 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Modern information security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.31673/2409-7292.2021.045963\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Modern information security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.31673/2409-7292.2021.045963","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Vulnerability analysis of wireless sensor networks
The analysis of the problem of cybersecurity of wireless sensor networks is carried out in the work, the purpose and tasks of management of protection of wireless sensor networks are defined. The purpose of security of sensor networks is defined. The analysis of vulnerabilities of wireless sensor networks is carried out. Based on the research conducted in the work, recommendations for the use of technology to manage their protection at the enterprise have been developed.