Designing secure sensor networks. Shi, E. & Perrig, A. IEEE Wireless Communications, 11(6):38–43, December, 2004. doi abstract bibtex Sensor networks are expected to play an essential role in the upcoming age of pervasive computing. Due to their constraints in computation, memory, and power resources, their susceptibility to physical capture, and use of wireless communications, security is a challenge in these networks. The scale of deployments of wireless sensor networks require careful decisions and trade-offs among various security measures. The authors discuss these issues and consider mechanisms to achieve secure communication in these networks.
@article{shi_designing_2004,
title = {Designing secure sensor networks},
volume = {11},
issn = {1536-1284},
doi = {10.1109/MWC.2004.1368895},
abstract = {Sensor networks are expected to play an essential role in the upcoming age of pervasive computing. Due to their constraints in computation, memory, and power resources, their susceptibility to physical capture, and use of wireless communications, security is a challenge in these networks. The scale of deployments of wireless sensor networks require careful decisions and trade-offs among various security measures. The authors discuss these issues and consider mechanisms to achieve secure communication in these networks.},
number = {6},
journal = {IEEE Wireless Communications},
author = {Shi, E. and Perrig, A.},
month = dec,
year = {2004},
pages = {38--43}
}
Downloads: 0
{"_id":"4mTtnw8s5ffLzv95o","bibbaseid":"shi-perrig-designingsecuresensornetworks-2004","downloads":0,"creationDate":"2019-02-15T15:14:57.856Z","title":"Designing secure sensor networks","author_short":["Shi, E.","Perrig, A."],"year":2004,"bibtype":"article","biburl":"https://bibbase.org/zotero/ky25","bibdata":{"bibtype":"article","type":"article","title":"Designing secure sensor networks","volume":"11","issn":"1536-1284","doi":"10.1109/MWC.2004.1368895","abstract":"Sensor networks are expected to play an essential role in the upcoming age of pervasive computing. Due to their constraints in computation, memory, and power resources, their susceptibility to physical capture, and use of wireless communications, security is a challenge in these networks. The scale of deployments of wireless sensor networks require careful decisions and trade-offs among various security measures. The authors discuss these issues and consider mechanisms to achieve secure communication in these networks.","number":"6","journal":"IEEE Wireless Communications","author":[{"propositions":[],"lastnames":["Shi"],"firstnames":["E."],"suffixes":[]},{"propositions":[],"lastnames":["Perrig"],"firstnames":["A."],"suffixes":[]}],"month":"December","year":"2004","pages":"38–43","bibtex":"@article{shi_designing_2004,\n\ttitle = {Designing secure sensor networks},\n\tvolume = {11},\n\tissn = {1536-1284},\n\tdoi = {10.1109/MWC.2004.1368895},\n\tabstract = {Sensor networks are expected to play an essential role in the upcoming age of pervasive computing. Due to their constraints in computation, memory, and power resources, their susceptibility to physical capture, and use of wireless communications, security is a challenge in these networks. The scale of deployments of wireless sensor networks require careful decisions and trade-offs among various security measures. The authors discuss these issues and consider mechanisms to achieve secure communication in these networks.},\n\tnumber = {6},\n\tjournal = {IEEE Wireless Communications},\n\tauthor = {Shi, E. and Perrig, A.},\n\tmonth = dec,\n\tyear = {2004},\n\tpages = {38--43}\n}\n\n","author_short":["Shi, E.","Perrig, A."],"key":"shi_designing_2004","id":"shi_designing_2004","bibbaseid":"shi-perrig-designingsecuresensornetworks-2004","role":"author","urls":{},"downloads":0},"search_terms":["designing","secure","sensor","networks","shi","perrig"],"keywords":["security","sensor-network","sensors"],"authorIDs":[],"dataSources":["XxiQtwZYfozhQmvGR"]}