Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
458217 | Information Security Technical Report | 2008 | 8 Pages |
Abstract
Wireless sensor networks can be used in various security-critical applications. The most challenging security problems are insider attacks. In this article we present security strategies to cope with insider attacks and a classification of mechanisms which apply the strategies. We show that strategies and mechanisms for wireless sensor networks have different characteristics and realizations than in classic computer systems because of the special requirements and conditions.
Related Topics
Physical Sciences and Engineering
Computer Science
Computer Networks and Communications
Authors
Christoph Krauß, Markus Schneider, Claudia Eckert,