Article ID Journal Published Year Pages File Type
458217 Information Security Technical Report 2008 8 Pages PDF
Abstract

Wireless sensor networks can be used in various security-critical applications. The most challenging security problems are insider attacks. In this article we present security strategies to cope with insider attacks and a classification of mechanisms which apply the strategies. We show that strategies and mechanisms for wireless sensor networks have different characteristics and realizations than in classic computer systems because of the special requirements and conditions.

Related Topics
Physical Sciences and Engineering Computer Science Computer Networks and Communications
Authors
, , ,