{"title":"无线战术传感器网络中的安全协议","authors":"D. Vergados, G. Stergiou","doi":"10.1109/MILCOM.2005.1605883","DOIUrl":null,"url":null,"abstract":"Advances in technology led to the development of sensor networks at low cost. Sensor networks can he used in several application areas including military, health, home, environmental and space exploration. Sensor nodes have several constraints, like limited computational and energy resources that pose design issues to researchers. In tactical sensor networks security plays an important role, since these networks are deployed in hostile environments and run safety-critical applications. This paper presents security protocols used in wireless networks and considers how well these algorithms can he applied to wireless tactical sensor networks","PeriodicalId":223742,"journal":{"name":"MILCOM 2005 - 2005 IEEE Military Communications Conference","volume":"88 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Security protocols in wireless tactical sensor networks\",\"authors\":\"D. Vergados, G. Stergiou\",\"doi\":\"10.1109/MILCOM.2005.1605883\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Advances in technology led to the development of sensor networks at low cost. Sensor networks can he used in several application areas including military, health, home, environmental and space exploration. Sensor nodes have several constraints, like limited computational and energy resources that pose design issues to researchers. In tactical sensor networks security plays an important role, since these networks are deployed in hostile environments and run safety-critical applications. This paper presents security protocols used in wireless networks and considers how well these algorithms can he applied to wireless tactical sensor networks\",\"PeriodicalId\":223742,\"journal\":{\"name\":\"MILCOM 2005 - 2005 IEEE Military Communications Conference\",\"volume\":\"88 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2005-10-17\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"MILCOM 2005 - 2005 IEEE Military Communications Conference\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/MILCOM.2005.1605883\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"MILCOM 2005 - 2005 IEEE Military Communications Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MILCOM.2005.1605883","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Security protocols in wireless tactical sensor networks
Advances in technology led to the development of sensor networks at low cost. Sensor networks can he used in several application areas including military, health, home, environmental and space exploration. Sensor nodes have several constraints, like limited computational and energy resources that pose design issues to researchers. In tactical sensor networks security plays an important role, since these networks are deployed in hostile environments and run safety-critical applications. This paper presents security protocols used in wireless networks and considers how well these algorithms can he applied to wireless tactical sensor networks