Designing secure sensor networks. Shi, E. & Perrig, A. IEEE Wireless Communications, 11(6):38–43, December, 2004.
doi  abstract   bibtex   
Sensor networks are expected to play an essential role in the upcoming age of pervasive computing. Due to their constraints in computation, memory, and power resources, their susceptibility to physical capture, and use of wireless communications, security is a challenge in these networks. The scale of deployments of wireless sensor networks require careful decisions and trade-offs among various security measures. The authors discuss these issues and consider mechanisms to achieve secure communication in these networks.
@article{shi_designing_2004,
	title = {Designing secure sensor networks},
	volume = {11},
	issn = {1536-1284},
	doi = {10.1109/MWC.2004.1368895},
	abstract = {Sensor networks are expected to play an essential role in the upcoming age of pervasive computing. Due to their constraints in computation, memory, and power resources, their susceptibility to physical capture, and use of wireless communications, security is a challenge in these networks. The scale of deployments of wireless sensor networks require careful decisions and trade-offs among various security measures. The authors discuss these issues and consider mechanisms to achieve secure communication in these networks.},
	number = {6},
	journal = {IEEE Wireless Communications},
	author = {Shi, E. and Perrig, A.},
	month = dec,
	year = {2004},
	pages = {38--43}
}

Downloads: 0