Hidehisa Nakayama, Nirwan Ansari, Abbas Jamalipour, Y. Nemoto, Nei Kato
{"title":"无线传感器网络数据采集与安全研究","authors":"Hidehisa Nakayama, Nirwan Ansari, Abbas Jamalipour, Y. Nemoto, Nei Kato","doi":"10.1109/SARNOF.2007.4567337","DOIUrl":null,"url":null,"abstract":"Expected growth in use and implementation of wireless sensor networks (WSNs) in different environments and for different applications creates new security challenges. In WSNs, a malicious node may initiate incorrect path information, change the contents of data packets, and even hijack one or more genuine network nodes. As the network reliability completely depends on individual nodespsila presence and collaborations with others, those malicious behaviors could halt WSNs. In this paper, the WSNs will be first categorized into three types in accordance to the way that data are collected. After a succinct summarization of each data gathering scheme, a comprehensive survey on security problems will be presented. Finally, some general design guidelines against typical attacks along with our proposals in WSNs will be provided. Unsolved problems and further studies will also be discussed.","PeriodicalId":293243,"journal":{"name":"2007 IEEE Sarnoff Symposium","volume":"64 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"15","resultStr":"{\"title\":\"On data gathering and security in wireless sensor networks\",\"authors\":\"Hidehisa Nakayama, Nirwan Ansari, Abbas Jamalipour, Y. Nemoto, Nei Kato\",\"doi\":\"10.1109/SARNOF.2007.4567337\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Expected growth in use and implementation of wireless sensor networks (WSNs) in different environments and for different applications creates new security challenges. In WSNs, a malicious node may initiate incorrect path information, change the contents of data packets, and even hijack one or more genuine network nodes. As the network reliability completely depends on individual nodespsila presence and collaborations with others, those malicious behaviors could halt WSNs. In this paper, the WSNs will be first categorized into three types in accordance to the way that data are collected. After a succinct summarization of each data gathering scheme, a comprehensive survey on security problems will be presented. Finally, some general design guidelines against typical attacks along with our proposals in WSNs will be provided. Unsolved problems and further studies will also be discussed.\",\"PeriodicalId\":293243,\"journal\":{\"name\":\"2007 IEEE Sarnoff Symposium\",\"volume\":\"64 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2007-04-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"15\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2007 IEEE Sarnoff Symposium\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SARNOF.2007.4567337\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2007 IEEE Sarnoff Symposium","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SARNOF.2007.4567337","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
On data gathering and security in wireless sensor networks
Expected growth in use and implementation of wireless sensor networks (WSNs) in different environments and for different applications creates new security challenges. In WSNs, a malicious node may initiate incorrect path information, change the contents of data packets, and even hijack one or more genuine network nodes. As the network reliability completely depends on individual nodespsila presence and collaborations with others, those malicious behaviors could halt WSNs. In this paper, the WSNs will be first categorized into three types in accordance to the way that data are collected. After a succinct summarization of each data gathering scheme, a comprehensive survey on security problems will be presented. Finally, some general design guidelines against typical attacks along with our proposals in WSNs will be provided. Unsolved problems and further studies will also be discussed.