{"title":"无线传感器网络的安全威胁及防御策略研究","authors":"Li Yi, Fu Zhongyong","doi":"10.1109/ICMTMA.2015.310","DOIUrl":null,"url":null,"abstract":"As wireless sensor network (WSN) become an emerging field of application, its security problem has also become a researched focus. This paper introduces the architecture and the application advantages of WSN, and points out its security flaws. According to various kinds of attacks in wireless sensor networks, the author made a comprehensive analysis and put forward the design of security architecture of WSN and the corresponding specific defense means.","PeriodicalId":196962,"journal":{"name":"2015 Seventh International Conference on Measuring Technology and Mechatronics Automation","volume":"69 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":"{\"title\":\"The Research of Security Threat and Corresponding Defense Strategy for WSN\",\"authors\":\"Li Yi, Fu Zhongyong\",\"doi\":\"10.1109/ICMTMA.2015.310\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"As wireless sensor network (WSN) become an emerging field of application, its security problem has also become a researched focus. This paper introduces the architecture and the application advantages of WSN, and points out its security flaws. According to various kinds of attacks in wireless sensor networks, the author made a comprehensive analysis and put forward the design of security architecture of WSN and the corresponding specific defense means.\",\"PeriodicalId\":196962,\"journal\":{\"name\":\"2015 Seventh International Conference on Measuring Technology and Mechatronics Automation\",\"volume\":\"69 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-06-13\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"10\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 Seventh International Conference on Measuring Technology and Mechatronics Automation\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICMTMA.2015.310\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 Seventh International Conference on Measuring Technology and Mechatronics Automation","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICMTMA.2015.310","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The Research of Security Threat and Corresponding Defense Strategy for WSN
As wireless sensor network (WSN) become an emerging field of application, its security problem has also become a researched focus. This paper introduces the architecture and the application advantages of WSN, and points out its security flaws. According to various kinds of attacks in wireless sensor networks, the author made a comprehensive analysis and put forward the design of security architecture of WSN and the corresponding specific defense means.