Security in wireless sensor networks
Recent advances in electronics and wireless communication technologies have enabled the development of large-scale wireless sensor networks that consist of many low-power, low-cost, and small-size sensor nodes. Sensor networks hold the promise of facilitating large-scale and real-time data processin...
Saved in:
Published in | IEEE wireless communications Vol. 15; no. 4; pp. 60 - 66 |
---|---|
Main Authors | , |
Format | Journal Article |
Language | English |
Published |
New York
IEEE
01.08.2008
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Recent advances in electronics and wireless communication technologies have enabled the development of large-scale wireless sensor networks that consist of many low-power, low-cost, and small-size sensor nodes. Sensor networks hold the promise of facilitating large-scale and real-time data processing in complex environments. Security is critical for many sensor network applications, such as military target tracking and security monitoring. To provide security and privacy to small sensor nodes is challenging, due to the limited capabilities of sensor nodes in terms of computation, communication, memory/storage, and energy supply. In this article we survey the state of the art in research on sensor network security. |
---|---|
AbstractList | Recent advances in electronics and wireless communication technologies have enabled the development of large-scale wireless sensor networks that consist of many low-power, low-cost, and small-size sensor nodes. Sensor networks hold the promise of facilitating large-scale and real-time data processing in complex environments. Security is critical for many sensor network applications, such as military target tracking and security monitoring. To provide security and privacy to small sensor nodes is challenging, due to the limited capabilities of sensor nodes in terms of computation, communication, memory/storage, and energy supply. In this article we survey the state of the art in research on sensor network security. |
Author | Xiaojiang Du Hsiao-Hwa Chen |
Author_xml | – sequence: 1 givenname: Xiaojiang Du surname: Xiaojiang Du fullname: Xiaojiang Du, Xiaojiang Du – sequence: 2 givenname: Hsiao-Hwa Chen surname: Hsiao-Hwa Chen fullname: Hsiao-Hwa Chen, Hsiao-Hwa Chen |
BookMark | eNp9kE1Lw0AQhhepYFu9C16CCJ5Sd2c_khyl1A-oeFDxuGzSCWxNd-tuQum_N6XVQw-eZmCed3h5RmTgvENCLhmdMEaLu5fP6QQozSdCFgUAnJAhkzJPqcqzwW7nKmWQizMyinFJKcuUVENy84ZVF2y7TaxLNjZggzEmEV30IXHYbnz4iufktDZNxIvDHJOPh9n79Cmdvz4-T-_nacUB2lRIqGohpVBclKYUQpbGlNzAgjOToQRkvDZMlUpWUCDAoi8BfEEFEzlSwcfkdv93Hfx3h7HVKxsrbBrj0HdR55mkmcyA9eT1Ebn0XXB9OZ0rzgvRkz2k9lAVfIwBa13Z1rTWuzYY22hG9U6d7tXpnTp9UNcH6VFwHezKhO1_kat9xCLiH_57_QE9H3kX |
CODEN | IWCEAS |
CitedBy_id | crossref_primary_10_1109_ACCESS_2019_2939490 crossref_primary_10_1109_TVT_2019_2894290 crossref_primary_10_1016_j_comcom_2015_01_003 crossref_primary_10_1002_cpe_2850 crossref_primary_10_1109_ACCESS_2018_2881719 crossref_primary_10_1109_ACCESS_2019_2952585 crossref_primary_10_3390_app9010175 crossref_primary_10_1109_TMC_2016_2595569 crossref_primary_10_1007_s11227_017_2179_3 crossref_primary_10_1049_iet_wss_2018_5008 crossref_primary_10_1016_j_bjp_2013_12_001 crossref_primary_10_1155_2015_751456 crossref_primary_10_1109_JAS_2021_1004207 crossref_primary_10_1109_ACCESS_2019_2899558 crossref_primary_10_1007_s11276_024_03690_9 crossref_primary_10_1109_ACCESS_2018_2797102 crossref_primary_10_1109_MNET_001_1900140 crossref_primary_10_1109_TVT_2019_2910217 crossref_primary_10_1109_JSAC_2018_2815442 crossref_primary_10_1109_TII_2019_2943331 crossref_primary_10_1016_j_future_2019_01_058 crossref_primary_10_1109_ACCESS_2016_2575863 crossref_primary_10_1109_ACCESS_2019_2931917 crossref_primary_10_4018_ijwnbt_2015010103 crossref_primary_10_1109_ACCESS_2018_2819166 crossref_primary_10_1109_JSAC_2020_3007043 crossref_primary_10_1007_s00521_019_04042_x crossref_primary_10_1186_s13638_023_02293_w crossref_primary_10_1007_s11276_017_1524_z crossref_primary_10_1109_ACCESS_2018_2853121 crossref_primary_10_1109_ACCESS_2019_2909048 crossref_primary_10_1016_j_comnet_2016_05_022 crossref_primary_10_3390_s130101210 crossref_primary_10_1109_JIOT_2019_2939144 crossref_primary_10_3390_s19040821 crossref_primary_10_1109_JIOT_2018_2888636 crossref_primary_10_1109_ACCESS_2018_2869543 crossref_primary_10_1109_MNET_001_1800162 crossref_primary_10_1109_MNET_011_2000176 crossref_primary_10_1109_ACCESS_2019_2900125 crossref_primary_10_1109_JSAC_2024_3414932 crossref_primary_10_3390_s19061274 crossref_primary_10_1016_j_disc_2024_114264 crossref_primary_10_1109_ACCESS_2020_2966399 crossref_primary_10_1145_2938639 crossref_primary_10_1016_j_comnet_2017_10_005 crossref_primary_10_1016_j_cose_2020_101863 crossref_primary_10_1109_TII_2019_2938778 crossref_primary_10_1007_s00607_020_00832_7 crossref_primary_10_1016_j_comnet_2018_11_008 crossref_primary_10_1109_ACCESS_2019_2957211 crossref_primary_10_1109_TVT_2018_2845798 crossref_primary_10_1155_2019_4074272 crossref_primary_10_1016_j_future_2018_07_064 crossref_primary_10_1016_j_matpr_2020_12_1065 crossref_primary_10_1049_iet_com_2019_0768 crossref_primary_10_1109_JSAC_2018_2804138 crossref_primary_10_1049_iet_com_2018_6012 crossref_primary_10_1109_TII_2019_2901011 crossref_primary_10_1109_JPHOT_2021_3113663 crossref_primary_10_1109_TII_2019_2907754 crossref_primary_10_1016_j_ins_2019_12_007 crossref_primary_10_3390_s20030657 crossref_primary_10_1016_j_autcon_2022_104168 crossref_primary_10_1109_ACCESS_2019_2958837 crossref_primary_10_1109_MWC_001_1900123 crossref_primary_10_1007_s11036_018_1040_0 crossref_primary_10_1177_1550147719899374 crossref_primary_10_1088_1757_899X_981_2_022043 crossref_primary_10_1016_j_tcs_2021_07_020 crossref_primary_10_1109_MNET_001_1900534 crossref_primary_10_1007_s11277_015_2866_4 crossref_primary_10_1109_IOTM_001_2100127 crossref_primary_10_3390_info13030105 crossref_primary_10_1016_j_jisa_2020_102497 crossref_primary_10_3390_app9030437 crossref_primary_10_1016_j_ins_2019_01_068 crossref_primary_10_3390_s19153362 crossref_primary_10_1016_j_ins_2019_04_011 crossref_primary_10_1109_TIFS_2016_2601061 crossref_primary_10_1109_JIOT_2017_2690522 crossref_primary_10_3390_s19122804 crossref_primary_10_1007_s00607_020_00862_1 crossref_primary_10_1016_j_tele_2012_03_011 crossref_primary_10_1007_s10916_017_0743_2 crossref_primary_10_1007_s11036_020_01656_7 crossref_primary_10_1016_j_jnca_2019_02_018 crossref_primary_10_1109_JIOT_2019_2951620 crossref_primary_10_1109_TAC_2020_2977913 crossref_primary_10_1109_TIFS_2012_2194704 crossref_primary_10_1109_TWC_2018_2868935 crossref_primary_10_1177_1550147720903628 crossref_primary_10_1109_TDSC_2019_2919517 crossref_primary_10_3390_app9010132 crossref_primary_10_1109_JIOT_2018_2803111 crossref_primary_10_1145_2680538 crossref_primary_10_1016_j_future_2019_08_016 crossref_primary_10_1109_JSYST_2017_2751645 crossref_primary_10_1186_s13638_019_1589_8 crossref_primary_10_1177_1550147720920478 crossref_primary_10_1002_wcm_905 crossref_primary_10_1155_2013_829048 crossref_primary_10_1155_2020_8864301 crossref_primary_10_1109_ACCESS_2019_2926404 crossref_primary_10_1109_JSEN_2024_3464513 crossref_primary_10_1155_2012_763187 crossref_primary_10_1016_j_jss_2012_06_074 crossref_primary_10_1016_j_micpro_2022_104675 crossref_primary_10_1016_j_jnca_2018_07_006 crossref_primary_10_1049_iet_wss_2011_0064 crossref_primary_10_1109_TGCN_2021_3064683 crossref_primary_10_1007_s11276_020_02350_y crossref_primary_10_3390_s19051235 crossref_primary_10_1016_j_jpdc_2019_06_001 crossref_primary_10_1002_jcd_21944 crossref_primary_10_3390_app9081561 crossref_primary_10_1109_MNET_011_1900635 crossref_primary_10_3390_s23167278 crossref_primary_10_1109_TIT_2019_2955473 crossref_primary_10_1109_TITS_2020_2970610 crossref_primary_10_1016_j_ins_2019_01_008 crossref_primary_10_1155_2017_3601802 crossref_primary_10_1109_TII_2016_2601562 crossref_primary_10_3390_app13053196 crossref_primary_10_1016_j_measurement_2019_107139 crossref_primary_10_1109_ACCESS_2019_2946482 crossref_primary_10_1109_ACCESS_2017_2706973 crossref_primary_10_1155_2016_6545791 crossref_primary_10_1016_j_matpr_2020_11_489 crossref_primary_10_1109_TCSS_2019_2946181 crossref_primary_10_1002_dac_4749 crossref_primary_10_1109_ACCESS_2017_2782847 crossref_primary_10_1007_s11042_023_17886_2 crossref_primary_10_1049_iet_com_2010_0538 crossref_primary_10_1109_TSP_2018_2824285 crossref_primary_10_1109_ACCESS_2019_2940822 crossref_primary_10_1109_ACCESS_2019_2935144 crossref_primary_10_1002_spe_2838 crossref_primary_10_1109_ACCESS_2018_2805783 crossref_primary_10_1109_JIOT_2020_3028598 crossref_primary_10_3390_s19051184 crossref_primary_10_3390_s18082727 crossref_primary_10_3390_s19040974 crossref_primary_10_1109_TCE_2023_3342635 crossref_primary_10_1080_03155986_2016_1167316 crossref_primary_10_1109_ACCESS_2017_2785444 crossref_primary_10_1109_JIOT_2019_2904728 crossref_primary_10_1186_1687_1499_2012_48 crossref_primary_10_3390_electronics11152403 crossref_primary_10_1109_ACCESS_2019_2950598 crossref_primary_10_1109_MWC_004_2100362 crossref_primary_10_1016_j_endm_2016_09_057 crossref_primary_10_1109_JIOT_2020_3002255 crossref_primary_10_3390_s130911453 crossref_primary_10_1109_JIOT_2022_3163607 crossref_primary_10_3390_s20236747 crossref_primary_10_1109_ACCESS_2018_2859767 crossref_primary_10_1109_TII_2018_2794442 crossref_primary_10_1177_1550147720921636 crossref_primary_10_1109_JIOT_2019_2906186 crossref_primary_10_1109_TII_2019_2943906 crossref_primary_10_17485_ijst_2018_v11i23_125633 crossref_primary_10_1109_MNET_001_1900173 crossref_primary_10_1109_MWC_2017_1600421 crossref_primary_10_1109_ACCESS_2019_2942335 crossref_primary_10_1109_JIOT_2018_2846653 crossref_primary_10_1109_TII_2019_2944678 |
Cites_doi | 10.1109/TVT.2007.912327 10.1145/958491.958508 10.1109/SECPRI.2003.1199337 10.1145/586115.586117 10.1109/INFCOM.2004.1354666 10.1145/938985.938995 10.1109/IPSN.2005.1440904 10.1109/PERCOM.2005.18 10.1109/WCNC.2003.1200555 10.1109/SAHCN.2004.1381904 10.1109/MC.2003.1236475 10.1145/948109.948119 10.1109/MC.2002.1039518 10.1201/9781420006155 10.1016/j.jpdc.2005.12.011 10.1109/TWC.2007.06095 10.1109/SNPA.2003.1203362 |
ContentType | Journal Article |
Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2008 |
Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2008 |
DBID | 97E RIA RIE AAYXX CITATION 7SP 8FD F28 FR3 L7M |
DOI | 10.1109/MWC.2008.4599222 |
DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005–Present IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef Electronics & Communications Abstracts Technology Research Database ANTE: Abstracts in New Technology & Engineering Engineering Research Database Advanced Technologies Database with Aerospace |
DatabaseTitle | CrossRef Engineering Research Database Technology Research Database Advanced Technologies Database with Aerospace ANTE: Abstracts in New Technology & Engineering Electronics & Communications Abstracts |
DatabaseTitleList | Engineering Research Database |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Xplore url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 1558-0687 |
EndPage | 66 |
ExternalDocumentID | 2329456251 10_1109_MWC_2008_4599222 4599222 |
Genre | orig-research |
GroupedDBID | -~X 0R~ 1OL 29I 4.4 5GY 5VS 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABQJQ ABVLG ACGFS ACIWK AENEX AETIX AGQYO AGSQL AHBIQ AIBXA AKJIK AKQYR ALMA_UNASSIGNED_HOLDINGS ATWAV AZLTO BEFXN BFFAM BGNUA BKEBE BPEOZ CS3 DU5 EBS EJD HZ~ H~9 IES IFIPE IPLJI JAVBF LAI M43 O9- OCL RIA RIE RNS TN5 AAYOK AAYXX CITATION RIG 7SP 8FD F28 FR3 L7M |
ID | FETCH-LOGICAL-c322t-452cf4554634bab445baab3a2d31a7e52e13fa16b65c29e22d17623d04148e043 |
IEDL.DBID | RIE |
ISSN | 1536-1284 |
IngestDate | Fri Jul 11 13:04:54 EDT 2025 Mon Jun 30 04:12:10 EDT 2025 Thu Apr 24 23:07:33 EDT 2025 Tue Jul 01 01:50:58 EDT 2025 Wed Aug 27 02:52:53 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 4 |
Language | English |
License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c322t-452cf4554634bab445baab3a2d31a7e52e13fa16b65c29e22d17623d04148e043 |
Notes | ObjectType-Article-2 SourceType-Scholarly Journals-1 ObjectType-Feature-1 content type line 14 content type line 23 |
PQID | 863394750 |
PQPubID | 75748 |
PageCount | 7 |
ParticipantIDs | crossref_citationtrail_10_1109_MWC_2008_4599222 ieee_primary_4599222 proquest_miscellaneous_875075721 proquest_journals_863394750 crossref_primary_10_1109_MWC_2008_4599222 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2008-08-01 |
PublicationDateYYYYMMDD | 2008-08-01 |
PublicationDate_xml | – month: 08 year: 2008 text: 2008-08-01 day: 01 |
PublicationDecade | 2000 |
PublicationPlace | New York |
PublicationPlace_xml | – name: New York |
PublicationTitle | IEEE wireless communications |
PublicationTitleAbbrev | WC-M |
PublicationYear | 2008 |
Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
References | ref13 perrig (ref7) 2001 ref12 ref15 ref20 ref11 ref10 du (ref18) 2006; 66 gura (ref8) 2004 ref2 song (ref14) 2005 ref1 ref17 ref16 ref19 chan (ref5) 2003 ref9 ref4 ref3 ref6 |
References_xml | – ident: ref15 doi: 10.1109/TVT.2007.912327 – ident: ref13 doi: 10.1145/958491.958508 – start-page: 197 year: 2003 ident: ref5 article-title: Random Key Predistribution Schemes for Sensor Networks publication-title: Proc 2003 IEEE Symp Sec and Privacy doi: 10.1109/SECPRI.2003.1199337 – year: 2004 ident: ref8 article-title: Comparing Elliptic Curve Cryptography and RSA on 8-Bit CPUs publication-title: Proc 6th Int'l Wksp Cryptographic Hardware and Embedded Sys – ident: ref4 doi: 10.1145/586115.586117 – ident: ref20 doi: 10.1109/INFCOM.2004.1354666 – ident: ref16 doi: 10.1145/938985.938995 – ident: ref17 doi: 10.1109/IPSN.2005.1440904 – ident: ref10 doi: 10.1109/PERCOM.2005.18 – ident: ref12 doi: 10.1109/WCNC.2003.1200555 – ident: ref9 doi: 10.1109/SAHCN.2004.1381904 – year: 2001 ident: ref7 article-title: SPINS: Security Protocols for Sensor Networks publication-title: Proc 7th ACM MobiCom – ident: ref3 doi: 10.1109/MC.2003.1236475 – ident: ref6 doi: 10.1145/948109.948119 – ident: ref1 doi: 10.1109/MC.2002.1039518 – ident: ref11 doi: 10.1201/9781420006155 – volume: 66 start-page: 874 year: 2006 ident: ref18 article-title: LAD: Localization Anomaly Detection for Wireless Sensor Networks publication-title: J Parallel and Distrib Comp doi: 10.1016/j.jpdc.2005.12.011 – ident: ref19 doi: 10.1109/TWC.2007.06095 – year: 2005 ident: ref14 article-title: Attack-Resilient Time Synchronization for Wireless Sensor Networks publication-title: Proc IEEE Int Conf Mobile Ad-hoc Sensor Syst – ident: ref2 doi: 10.1109/SNPA.2003.1203362 |
SSID | ssj0017656 |
Score | 2.432224 |
Snippet | Recent advances in electronics and wireless communication technologies have enabled the development of large-scale wireless sensor networks that consist of... |
SourceID | proquest crossref ieee |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 60 |
SubjectTerms | Communications technology Data processing Data security Electronics Large-scale systems Military Military computing Monitoring Networks Privacy Security Sensors Target tracking Wireless communication Wireless sensor networks |
Title | Security in wireless sensor networks |
URI | https://ieeexplore.ieee.org/document/4599222 https://www.proquest.com/docview/863394750 https://www.proquest.com/docview/875075721 |
Volume | 15 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3NT4MwFG_mTnrwaxrn1HDYxUQ2oAXK0Swui8m86OJupKWviXFhZoOLf72vFIhfMXIitCXlta-vj_fr-xEylBw0By5dpqVyjYV2OU8yN_aFp9AegYrNaeT5QzRbsPtluOyQm_YsDABU4DMYmdsqlq_WWWl-lY1ZaLKo4oK7g46bPavVRgziqGJqRQU2vDKcNSFJLxnPnycWNFm3_2KCKk6VHwtxZV2mB2Te9MuCSl5HZSFH2fu3lI3_7fgh2a-3mc6tnRdHpAP5Mdn7lHywR4aPNXWd85I7JmPxChc9Z4tu7Xrj5BYdvj0hi-nd02Tm1pwJboaqWaC0g0wzAz2jTArJWCiFkFQEivoihjAAn2rhRzIKsyCBIFAouYAqj6FfBB6jp6Sbr3M4I45ioPAyQwksjDXXNIkypjxNpVaR6pNxI8Y0qxOKG16LVVo5Fl6SouAtzWX9_X1y3bZ4s8k0_qjbM3Js67WPB81IpbW2bVMeUZow3Pv0idOWopqY2IfIYV1iFSyNQ3R3z39_74DsWiSIgfZdkG6xKeEStxuFvKrm2QenrtDL |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT4NAEJ409aAefFVjrQ8OvZhIC-wCy9E0NlXbXmxjb4Rlh8TYUNPSi7_eWaDEV4ycCLtsltmdnR3m2_kA2lJgIlBIkydSmdpCm0IEsenbkaXIHqHy9Wnk0dgbTPnDzJ3V4KY6C4OIOfgMO_o2j-WrRbzWv8q63NVZVGnB3SK77zrFaa0qZuB7OVcrqbBmlhF8E5S0gu7ouVfAJssWvhihnFXlx1Kc25f-Pow2PStgJa-ddSY78fu3pI3_7foB7JUbTeO2mBmHUMP0CHY_pR9sQPupJK8zXlJD5yye07JnrMixXSyNtMCHr45h2r-b9AZmyZpgxqScGcnbiROuwWeMy0hy7sookixyFLMjH10HbZZEtic9N3YCdBxFknOYsjh5RmhxdgL1dJHiKRiKo6JLDyZy109EwgIv5spKmEyUp5rQ3YgxjMuU4prZYh7mroUVhCT4guiy_P4mXFdvvBXpNP6o29ByrOpVj1ubkQpLfVuFwmMs4LT7aYJRlZKi6OhHlOJiTVWo1HfJ4T37vd0r2B5MRsNweD9-bMFOgQvRQL9zqGfLNV7Q5iOTl_mc-wC64tQV |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Security+in+wireless+sensor+networks&rft.jtitle=IEEE+wireless+communications&rft.au=Xiaojiang+Du&rft.au=Hsiao-Hwa+Chen&rft.date=2008-08-01&rft.issn=1536-1284&rft.volume=15&rft.issue=4&rft.spage=60&rft.epage=66&rft_id=info:doi/10.1109%2FMWC.2008.4599222&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_MWC_2008_4599222 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1536-1284&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1536-1284&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1536-1284&client=summon |