{"title":"面向资源的异构集群传感器网络安全解决方案","authors":"Xiaomei Cao, Guihai Chen, Bo Yu","doi":"10.1109/MOBHOC.2006.278642","DOIUrl":null,"url":null,"abstract":"Heterogeneous clustered sensor networks (HCSNs) help meet the cost, lifetime, and scalability requirements of real applications. However, the security solution should be reconsidered for their unique properties, such as uneven resources and in-network processing. In this paper, we provide a resource oriented security solution (ROSS) to protect the network connectivity of HCSNs. ROSS is a robust security solution that is embedded into network layer operations, resulting in in-depth defense against attacks from both external attackers and compromised nodes. Through security analysis and performance simulation, we demonstrate that ROSS not only achieves the predefined security goals, but also allows a tradeoff between security and performance cost","PeriodicalId":345003,"journal":{"name":"2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems","volume":"279 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2006-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Providing Resource Oriented Security Solution for Heterogeneous Clustered Sensor Networks\",\"authors\":\"Xiaomei Cao, Guihai Chen, Bo Yu\",\"doi\":\"10.1109/MOBHOC.2006.278642\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Heterogeneous clustered sensor networks (HCSNs) help meet the cost, lifetime, and scalability requirements of real applications. However, the security solution should be reconsidered for their unique properties, such as uneven resources and in-network processing. In this paper, we provide a resource oriented security solution (ROSS) to protect the network connectivity of HCSNs. ROSS is a robust security solution that is embedded into network layer operations, resulting in in-depth defense against attacks from both external attackers and compromised nodes. Through security analysis and performance simulation, we demonstrate that ROSS not only achieves the predefined security goals, but also allows a tradeoff between security and performance cost\",\"PeriodicalId\":345003,\"journal\":{\"name\":\"2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems\",\"volume\":\"279 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2006-10-09\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/MOBHOC.2006.278642\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MOBHOC.2006.278642","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Providing Resource Oriented Security Solution for Heterogeneous Clustered Sensor Networks
Heterogeneous clustered sensor networks (HCSNs) help meet the cost, lifetime, and scalability requirements of real applications. However, the security solution should be reconsidered for their unique properties, such as uneven resources and in-network processing. In this paper, we provide a resource oriented security solution (ROSS) to protect the network connectivity of HCSNs. ROSS is a robust security solution that is embedded into network layer operations, resulting in in-depth defense against attacks from both external attackers and compromised nodes. Through security analysis and performance simulation, we demonstrate that ROSS not only achieves the predefined security goals, but also allows a tradeoff between security and performance cost