Title
On handling insider attacks in wireless sensor networks
Abstract
Wireless sensor networks can be used in various security-critical applications. The most challenging security problems are insider attacks. In this article we present security strategies to cope with insider attacks and a classification of mechanisms which apply the strategies. We show that strategies and mechanisms for wireless sensor networks have different characteristics and realizations than in classic computer systems because of the special requirements and conditions.
Year
DOI
Venue
2008
10.1016/j.istr.2008.10.011
Inf. Sec. Techn. Report
Keywords
Field
DocType
classic computer system,security,special requirement,insider attacks,different characteristic,wireless sensor network,challenging security problem,wireless sensor networks,insider attack,present security strategy,various security-critical application
Key distribution in wireless sensor networks,Internet privacy,Computer science,Computer security,Computer network,Insider,Mobile wireless sensor network,Wireless sensor network
Journal
Volume
Issue
ISSN
13
3
Information Security Technical Report
Citations 
PageRank 
References 
8
0.66
32
Authors
3
Name
Order
Citations
PageRank
Christoph Krauí180.66
Markus Schneider2626.33
Claudia Eckert3334.08