Abstract | ||
---|---|---|
Wireless sensor networks can be used in various security-critical applications. The most challenging security problems are insider attacks. In this article we present security strategies to cope with insider attacks and a classification of mechanisms which apply the strategies. We show that strategies and mechanisms for wireless sensor networks have different characteristics and realizations than in classic computer systems because of the special requirements and conditions. |
Year | DOI | Venue |
---|---|---|
2008 | 10.1016/j.istr.2008.10.011 | Inf. Sec. Techn. Report |
Keywords | Field | DocType |
classic computer system,security,special requirement,insider attacks,different characteristic,wireless sensor network,challenging security problem,wireless sensor networks,insider attack,present security strategy,various security-critical application | Key distribution in wireless sensor networks,Internet privacy,Computer science,Computer security,Computer network,Insider,Mobile wireless sensor network,Wireless sensor network | Journal |
Volume | Issue | ISSN |
13 | 3 | Information Security Technical Report |
Citations | PageRank | References |
8 | 0.66 | 32 |
Authors | ||
3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Christoph Krauí | 1 | 8 | 0.66 |
Markus Schneider | 2 | 62 | 6.33 |
Claudia Eckert | 3 | 33 | 4.08 |