Security in wireless sensor networks

Recent advances in electronics and wireless communication technologies have enabled the development of large-scale wireless sensor networks that consist of many low-power, low-cost, and small-size sensor nodes. Sensor networks hold the promise of facilitating large-scale and real-time data processin...

Full description

Saved in:
Bibliographic Details
Published inIEEE wireless communications Vol. 15; no. 4; pp. 60 - 66
Main Authors Xiaojiang Du, Xiaojiang Du, Hsiao-Hwa Chen, Hsiao-Hwa Chen
Format Journal Article
LanguageEnglish
Published New York IEEE 01.08.2008
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Recent advances in electronics and wireless communication technologies have enabled the development of large-scale wireless sensor networks that consist of many low-power, low-cost, and small-size sensor nodes. Sensor networks hold the promise of facilitating large-scale and real-time data processing in complex environments. Security is critical for many sensor network applications, such as military target tracking and security monitoring. To provide security and privacy to small sensor nodes is challenging, due to the limited capabilities of sensor nodes in terms of computation, communication, memory/storage, and energy supply. In this article we survey the state of the art in research on sensor network security.
AbstractList Recent advances in electronics and wireless communication technologies have enabled the development of large-scale wireless sensor networks that consist of many low-power, low-cost, and small-size sensor nodes. Sensor networks hold the promise of facilitating large-scale and real-time data processing in complex environments. Security is critical for many sensor network applications, such as military target tracking and security monitoring. To provide security and privacy to small sensor nodes is challenging, due to the limited capabilities of sensor nodes in terms of computation, communication, memory/storage, and energy supply. In this article we survey the state of the art in research on sensor network security.
Author Xiaojiang Du
Hsiao-Hwa Chen
Author_xml – sequence: 1
  givenname: Xiaojiang Du
  surname: Xiaojiang Du
  fullname: Xiaojiang Du, Xiaojiang Du
– sequence: 2
  givenname: Hsiao-Hwa Chen
  surname: Hsiao-Hwa Chen
  fullname: Hsiao-Hwa Chen, Hsiao-Hwa Chen
BookMark eNp9kE1Lw0AQhhepYFu9C16CCJ5Sd2c_khyl1A-oeFDxuGzSCWxNd-tuQum_N6XVQw-eZmCed3h5RmTgvENCLhmdMEaLu5fP6QQozSdCFgUAnJAhkzJPqcqzwW7nKmWQizMyinFJKcuUVENy84ZVF2y7TaxLNjZggzEmEV30IXHYbnz4iufktDZNxIvDHJOPh9n79Cmdvz4-T-_nacUB2lRIqGohpVBclKYUQpbGlNzAgjOToQRkvDZMlUpWUCDAoi8BfEEFEzlSwcfkdv93Hfx3h7HVKxsrbBrj0HdR55mkmcyA9eT1Ebn0XXB9OZ0rzgvRkz2k9lAVfIwBa13Z1rTWuzYY22hG9U6d7tXpnTp9UNcH6VFwHezKhO1_kat9xCLiH_57_QE9H3kX
CODEN IWCEAS
CitedBy_id crossref_primary_10_1109_ACCESS_2019_2939490
crossref_primary_10_1109_TVT_2019_2894290
crossref_primary_10_1016_j_comcom_2015_01_003
crossref_primary_10_1002_cpe_2850
crossref_primary_10_1109_ACCESS_2018_2881719
crossref_primary_10_1109_ACCESS_2019_2952585
crossref_primary_10_3390_app9010175
crossref_primary_10_1109_TMC_2016_2595569
crossref_primary_10_1007_s11227_017_2179_3
crossref_primary_10_1049_iet_wss_2018_5008
crossref_primary_10_1016_j_bjp_2013_12_001
crossref_primary_10_1155_2015_751456
crossref_primary_10_1109_JAS_2021_1004207
crossref_primary_10_1109_ACCESS_2019_2899558
crossref_primary_10_1007_s11276_024_03690_9
crossref_primary_10_1109_ACCESS_2018_2797102
crossref_primary_10_1109_MNET_001_1900140
crossref_primary_10_1109_TVT_2019_2910217
crossref_primary_10_1109_JSAC_2018_2815442
crossref_primary_10_1109_TII_2019_2943331
crossref_primary_10_1016_j_future_2019_01_058
crossref_primary_10_1109_ACCESS_2016_2575863
crossref_primary_10_1109_ACCESS_2019_2931917
crossref_primary_10_4018_ijwnbt_2015010103
crossref_primary_10_1109_ACCESS_2018_2819166
crossref_primary_10_1109_JSAC_2020_3007043
crossref_primary_10_1007_s00521_019_04042_x
crossref_primary_10_1186_s13638_023_02293_w
crossref_primary_10_1007_s11276_017_1524_z
crossref_primary_10_1109_ACCESS_2018_2853121
crossref_primary_10_1109_ACCESS_2019_2909048
crossref_primary_10_1016_j_comnet_2016_05_022
crossref_primary_10_3390_s130101210
crossref_primary_10_1109_JIOT_2019_2939144
crossref_primary_10_3390_s19040821
crossref_primary_10_1109_JIOT_2018_2888636
crossref_primary_10_1109_ACCESS_2018_2869543
crossref_primary_10_1109_MNET_001_1800162
crossref_primary_10_1109_MNET_011_2000176
crossref_primary_10_1109_ACCESS_2019_2900125
crossref_primary_10_1109_JSAC_2024_3414932
crossref_primary_10_3390_s19061274
crossref_primary_10_1016_j_disc_2024_114264
crossref_primary_10_1109_ACCESS_2020_2966399
crossref_primary_10_1145_2938639
crossref_primary_10_1016_j_comnet_2017_10_005
crossref_primary_10_1016_j_cose_2020_101863
crossref_primary_10_1109_TII_2019_2938778
crossref_primary_10_1007_s00607_020_00832_7
crossref_primary_10_1016_j_comnet_2018_11_008
crossref_primary_10_1109_ACCESS_2019_2957211
crossref_primary_10_1109_TVT_2018_2845798
crossref_primary_10_1155_2019_4074272
crossref_primary_10_1016_j_future_2018_07_064
crossref_primary_10_1016_j_matpr_2020_12_1065
crossref_primary_10_1049_iet_com_2019_0768
crossref_primary_10_1109_JSAC_2018_2804138
crossref_primary_10_1049_iet_com_2018_6012
crossref_primary_10_1109_TII_2019_2901011
crossref_primary_10_1109_JPHOT_2021_3113663
crossref_primary_10_1109_TII_2019_2907754
crossref_primary_10_1016_j_ins_2019_12_007
crossref_primary_10_3390_s20030657
crossref_primary_10_1016_j_autcon_2022_104168
crossref_primary_10_1109_ACCESS_2019_2958837
crossref_primary_10_1109_MWC_001_1900123
crossref_primary_10_1007_s11036_018_1040_0
crossref_primary_10_1177_1550147719899374
crossref_primary_10_1088_1757_899X_981_2_022043
crossref_primary_10_1016_j_tcs_2021_07_020
crossref_primary_10_1109_MNET_001_1900534
crossref_primary_10_1007_s11277_015_2866_4
crossref_primary_10_1109_IOTM_001_2100127
crossref_primary_10_3390_info13030105
crossref_primary_10_1016_j_jisa_2020_102497
crossref_primary_10_3390_app9030437
crossref_primary_10_1016_j_ins_2019_01_068
crossref_primary_10_3390_s19153362
crossref_primary_10_1016_j_ins_2019_04_011
crossref_primary_10_1109_TIFS_2016_2601061
crossref_primary_10_1109_JIOT_2017_2690522
crossref_primary_10_3390_s19122804
crossref_primary_10_1007_s00607_020_00862_1
crossref_primary_10_1016_j_tele_2012_03_011
crossref_primary_10_1007_s10916_017_0743_2
crossref_primary_10_1007_s11036_020_01656_7
crossref_primary_10_1016_j_jnca_2019_02_018
crossref_primary_10_1109_JIOT_2019_2951620
crossref_primary_10_1109_TAC_2020_2977913
crossref_primary_10_1109_TIFS_2012_2194704
crossref_primary_10_1109_TWC_2018_2868935
crossref_primary_10_1177_1550147720903628
crossref_primary_10_1109_TDSC_2019_2919517
crossref_primary_10_3390_app9010132
crossref_primary_10_1109_JIOT_2018_2803111
crossref_primary_10_1145_2680538
crossref_primary_10_1016_j_future_2019_08_016
crossref_primary_10_1109_JSYST_2017_2751645
crossref_primary_10_1186_s13638_019_1589_8
crossref_primary_10_1177_1550147720920478
crossref_primary_10_1002_wcm_905
crossref_primary_10_1155_2013_829048
crossref_primary_10_1155_2020_8864301
crossref_primary_10_1109_ACCESS_2019_2926404
crossref_primary_10_1109_JSEN_2024_3464513
crossref_primary_10_1155_2012_763187
crossref_primary_10_1016_j_jss_2012_06_074
crossref_primary_10_1016_j_micpro_2022_104675
crossref_primary_10_1016_j_jnca_2018_07_006
crossref_primary_10_1049_iet_wss_2011_0064
crossref_primary_10_1109_TGCN_2021_3064683
crossref_primary_10_1007_s11276_020_02350_y
crossref_primary_10_3390_s19051235
crossref_primary_10_1016_j_jpdc_2019_06_001
crossref_primary_10_1002_jcd_21944
crossref_primary_10_3390_app9081561
crossref_primary_10_1109_MNET_011_1900635
crossref_primary_10_3390_s23167278
crossref_primary_10_1109_TIT_2019_2955473
crossref_primary_10_1109_TITS_2020_2970610
crossref_primary_10_1016_j_ins_2019_01_008
crossref_primary_10_1155_2017_3601802
crossref_primary_10_1109_TII_2016_2601562
crossref_primary_10_3390_app13053196
crossref_primary_10_1016_j_measurement_2019_107139
crossref_primary_10_1109_ACCESS_2019_2946482
crossref_primary_10_1109_ACCESS_2017_2706973
crossref_primary_10_1155_2016_6545791
crossref_primary_10_1016_j_matpr_2020_11_489
crossref_primary_10_1109_TCSS_2019_2946181
crossref_primary_10_1002_dac_4749
crossref_primary_10_1109_ACCESS_2017_2782847
crossref_primary_10_1007_s11042_023_17886_2
crossref_primary_10_1049_iet_com_2010_0538
crossref_primary_10_1109_TSP_2018_2824285
crossref_primary_10_1109_ACCESS_2019_2940822
crossref_primary_10_1109_ACCESS_2019_2935144
crossref_primary_10_1002_spe_2838
crossref_primary_10_1109_ACCESS_2018_2805783
crossref_primary_10_1109_JIOT_2020_3028598
crossref_primary_10_3390_s19051184
crossref_primary_10_3390_s18082727
crossref_primary_10_3390_s19040974
crossref_primary_10_1109_TCE_2023_3342635
crossref_primary_10_1080_03155986_2016_1167316
crossref_primary_10_1109_ACCESS_2017_2785444
crossref_primary_10_1109_JIOT_2019_2904728
crossref_primary_10_1186_1687_1499_2012_48
crossref_primary_10_3390_electronics11152403
crossref_primary_10_1109_ACCESS_2019_2950598
crossref_primary_10_1109_MWC_004_2100362
crossref_primary_10_1016_j_endm_2016_09_057
crossref_primary_10_1109_JIOT_2020_3002255
crossref_primary_10_3390_s130911453
crossref_primary_10_1109_JIOT_2022_3163607
crossref_primary_10_3390_s20236747
crossref_primary_10_1109_ACCESS_2018_2859767
crossref_primary_10_1109_TII_2018_2794442
crossref_primary_10_1177_1550147720921636
crossref_primary_10_1109_JIOT_2019_2906186
crossref_primary_10_1109_TII_2019_2943906
crossref_primary_10_17485_ijst_2018_v11i23_125633
crossref_primary_10_1109_MNET_001_1900173
crossref_primary_10_1109_MWC_2017_1600421
crossref_primary_10_1109_ACCESS_2019_2942335
crossref_primary_10_1109_JIOT_2018_2846653
crossref_primary_10_1109_TII_2019_2944678
Cites_doi 10.1109/TVT.2007.912327
10.1145/958491.958508
10.1109/SECPRI.2003.1199337
10.1145/586115.586117
10.1109/INFCOM.2004.1354666
10.1145/938985.938995
10.1109/IPSN.2005.1440904
10.1109/PERCOM.2005.18
10.1109/WCNC.2003.1200555
10.1109/SAHCN.2004.1381904
10.1109/MC.2003.1236475
10.1145/948109.948119
10.1109/MC.2002.1039518
10.1201/9781420006155
10.1016/j.jpdc.2005.12.011
10.1109/TWC.2007.06095
10.1109/SNPA.2003.1203362
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2008
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2008
DBID 97E
RIA
RIE
AAYXX
CITATION
7SP
8FD
F28
FR3
L7M
DOI 10.1109/MWC.2008.4599222
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005–Present
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
CrossRef
Electronics & Communications Abstracts
Technology Research Database
ANTE: Abstracts in New Technology & Engineering
Engineering Research Database
Advanced Technologies Database with Aerospace
DatabaseTitle CrossRef
Engineering Research Database
Technology Research Database
Advanced Technologies Database with Aerospace
ANTE: Abstracts in New Technology & Engineering
Electronics & Communications Abstracts
DatabaseTitleList Engineering Research Database

Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Xplore
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1558-0687
EndPage 66
ExternalDocumentID 2329456251
10_1109_MWC_2008_4599222
4599222
Genre orig-research
GroupedDBID -~X
0R~
1OL
29I
4.4
5GY
5VS
6IK
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABQJQ
ABVLG
ACGFS
ACIWK
AENEX
AETIX
AGQYO
AGSQL
AHBIQ
AIBXA
AKJIK
AKQYR
ALMA_UNASSIGNED_HOLDINGS
ATWAV
AZLTO
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CS3
DU5
EBS
EJD
HZ~
H~9
IES
IFIPE
IPLJI
JAVBF
LAI
M43
O9-
OCL
RIA
RIE
RNS
TN5
AAYOK
AAYXX
CITATION
RIG
7SP
8FD
F28
FR3
L7M
ID FETCH-LOGICAL-c322t-452cf4554634bab445baab3a2d31a7e52e13fa16b65c29e22d17623d04148e043
IEDL.DBID RIE
ISSN 1536-1284
IngestDate Fri Jul 11 13:04:54 EDT 2025
Mon Jun 30 04:12:10 EDT 2025
Thu Apr 24 23:07:33 EDT 2025
Tue Jul 01 01:50:58 EDT 2025
Wed Aug 27 02:52:53 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 4
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c322t-452cf4554634bab445baab3a2d31a7e52e13fa16b65c29e22d17623d04148e043
Notes ObjectType-Article-2
SourceType-Scholarly Journals-1
ObjectType-Feature-1
content type line 14
content type line 23
PQID 863394750
PQPubID 75748
PageCount 7
ParticipantIDs crossref_citationtrail_10_1109_MWC_2008_4599222
ieee_primary_4599222
proquest_miscellaneous_875075721
proquest_journals_863394750
crossref_primary_10_1109_MWC_2008_4599222
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2008-08-01
PublicationDateYYYYMMDD 2008-08-01
PublicationDate_xml – month: 08
  year: 2008
  text: 2008-08-01
  day: 01
PublicationDecade 2000
PublicationPlace New York
PublicationPlace_xml – name: New York
PublicationTitle IEEE wireless communications
PublicationTitleAbbrev WC-M
PublicationYear 2008
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref13
perrig (ref7) 2001
ref12
ref15
ref20
ref11
ref10
du (ref18) 2006; 66
gura (ref8) 2004
ref2
song (ref14) 2005
ref1
ref17
ref16
ref19
chan (ref5) 2003
ref9
ref4
ref3
ref6
References_xml – ident: ref15
  doi: 10.1109/TVT.2007.912327
– ident: ref13
  doi: 10.1145/958491.958508
– start-page: 197
  year: 2003
  ident: ref5
  article-title: Random Key Predistribution Schemes for Sensor Networks
  publication-title: Proc 2003 IEEE Symp Sec and Privacy
  doi: 10.1109/SECPRI.2003.1199337
– year: 2004
  ident: ref8
  article-title: Comparing Elliptic Curve Cryptography and RSA on 8-Bit CPUs
  publication-title: Proc 6th Int'l Wksp Cryptographic Hardware and Embedded Sys
– ident: ref4
  doi: 10.1145/586115.586117
– ident: ref20
  doi: 10.1109/INFCOM.2004.1354666
– ident: ref16
  doi: 10.1145/938985.938995
– ident: ref17
  doi: 10.1109/IPSN.2005.1440904
– ident: ref10
  doi: 10.1109/PERCOM.2005.18
– ident: ref12
  doi: 10.1109/WCNC.2003.1200555
– ident: ref9
  doi: 10.1109/SAHCN.2004.1381904
– year: 2001
  ident: ref7
  article-title: SPINS: Security Protocols for Sensor Networks
  publication-title: Proc 7th ACM MobiCom
– ident: ref3
  doi: 10.1109/MC.2003.1236475
– ident: ref6
  doi: 10.1145/948109.948119
– ident: ref1
  doi: 10.1109/MC.2002.1039518
– ident: ref11
  doi: 10.1201/9781420006155
– volume: 66
  start-page: 874
  year: 2006
  ident: ref18
  article-title: LAD: Localization Anomaly Detection for Wireless Sensor Networks
  publication-title: J Parallel and Distrib Comp
  doi: 10.1016/j.jpdc.2005.12.011
– ident: ref19
  doi: 10.1109/TWC.2007.06095
– year: 2005
  ident: ref14
  article-title: Attack-Resilient Time Synchronization for Wireless Sensor Networks
  publication-title: Proc IEEE Int Conf Mobile Ad-hoc Sensor Syst
– ident: ref2
  doi: 10.1109/SNPA.2003.1203362
SSID ssj0017656
Score 2.432224
Snippet Recent advances in electronics and wireless communication technologies have enabled the development of large-scale wireless sensor networks that consist of...
SourceID proquest
crossref
ieee
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 60
SubjectTerms Communications technology
Data processing
Data security
Electronics
Large-scale systems
Military
Military computing
Monitoring
Networks
Privacy
Security
Sensors
Target tracking
Wireless communication
Wireless sensor networks
Title Security in wireless sensor networks
URI https://ieeexplore.ieee.org/document/4599222
https://www.proquest.com/docview/863394750
https://www.proquest.com/docview/875075721
Volume 15
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3NT4MwFG_mTnrwaxrn1HDYxUQ2oAXK0Swui8m86OJupKWviXFhZoOLf72vFIhfMXIitCXlta-vj_fr-xEylBw0By5dpqVyjYV2OU8yN_aFp9AegYrNaeT5QzRbsPtluOyQm_YsDABU4DMYmdsqlq_WWWl-lY1ZaLKo4oK7g46bPavVRgziqGJqRQU2vDKcNSFJLxnPnycWNFm3_2KCKk6VHwtxZV2mB2Te9MuCSl5HZSFH2fu3lI3_7fgh2a-3mc6tnRdHpAP5Mdn7lHywR4aPNXWd85I7JmPxChc9Z4tu7Xrj5BYdvj0hi-nd02Tm1pwJboaqWaC0g0wzAz2jTArJWCiFkFQEivoihjAAn2rhRzIKsyCBIFAouYAqj6FfBB6jp6Sbr3M4I45ioPAyQwksjDXXNIkypjxNpVaR6pNxI8Y0qxOKG16LVVo5Fl6SouAtzWX9_X1y3bZ4s8k0_qjbM3Js67WPB81IpbW2bVMeUZow3Pv0idOWopqY2IfIYV1iFSyNQ3R3z39_74DsWiSIgfZdkG6xKeEStxuFvKrm2QenrtDL
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT4NAEJ409aAefFVjrQ8OvZhIC-wCy9E0NlXbXmxjb4Rlh8TYUNPSi7_eWaDEV4ycCLtsltmdnR3m2_kA2lJgIlBIkydSmdpCm0IEsenbkaXIHqHy9Wnk0dgbTPnDzJ3V4KY6C4OIOfgMO_o2j-WrRbzWv8q63NVZVGnB3SK77zrFaa0qZuB7OVcrqbBmlhF8E5S0gu7ouVfAJssWvhihnFXlx1Kc25f-Pow2PStgJa-ddSY78fu3pI3_7foB7JUbTeO2mBmHUMP0CHY_pR9sQPupJK8zXlJD5yye07JnrMixXSyNtMCHr45h2r-b9AZmyZpgxqScGcnbiROuwWeMy0hy7sookixyFLMjH10HbZZEtic9N3YCdBxFknOYsjh5RmhxdgL1dJHiKRiKo6JLDyZy109EwgIv5spKmEyUp5rQ3YgxjMuU4prZYh7mroUVhCT4guiy_P4mXFdvvBXpNP6o29ByrOpVj1ubkQpLfVuFwmMs4LT7aYJRlZKi6OhHlOJiTVWo1HfJ4T37vd0r2B5MRsNweD9-bMFOgQvRQL9zqGfLNV7Q5iOTl_mc-wC64tQV
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Security+in+wireless+sensor+networks&rft.jtitle=IEEE+wireless+communications&rft.au=Xiaojiang+Du&rft.au=Hsiao-Hwa+Chen&rft.date=2008-08-01&rft.issn=1536-1284&rft.volume=15&rft.issue=4&rft.spage=60&rft.epage=66&rft_id=info:doi/10.1109%2FMWC.2008.4599222&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_MWC_2008_4599222
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1536-1284&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1536-1284&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1536-1284&client=summon