Team for Research in
Ubiquitous Secure Technology

Security of Sensor Networks
Tanya Roosta

Citation
Tanya Roosta. "Security of Sensor Networks". Talk or presentation, 9, November, 2006.

Abstract
Ad-hoc sensor networks have become common over the past few years and the domain of their application is increasing widely. However, the security of these networks poses a great challenge due to the fact that they consist of tiny wireless devices which have limited hardware and energy resources. In addition, these networks are generally deployed and then left unattended. These facts coupled together make it impractical to directly apply the traditional security mechanisms to the sensor network paradigm. Therefore, there is a need to analyze and better understand the security requirements of sensor networks. This talk provides a comprehensive taxonomy of security attacks on sensor networks, and outlines the existing solutions for each set of attacks and points out the research directions which need to be further investigated in the future.

Electronic downloads

Citation formats  
  • HTML
    Tanya Roosta. <a
    href="http://www.truststc.org/pubs/138.html"
    ><i>Security of Sensor
    Networks</i></a>, Talk or presentation,  9,
    November, 2006.
  • Plain text
    Tanya Roosta. "Security of Sensor Networks". Talk
    or presentation,  9, November, 2006.
  • BibTeX
    @presentation{Roosta06_SecurityOfSensorNetworks,
        author = {Tanya Roosta},
        title = {Security of Sensor Networks},
        day = {9},
        month = {November},
        year = {2006},
        abstract = {Ad-hoc sensor networks have become common over the
                  past few years and the domain of their application
                  is increasing widely. However, the security of
                  these networks poses a great challenge due to the
                  fact that they consist of tiny wireless devices
                  which have limited hardware and energy resources.
                  In addition, these networks are generally deployed
                  and then left unattended. These facts coupled
                  together make it impractical to directly apply the
                  traditional security mechanisms to the sensor
                  network paradigm. Therefore, there is a need to
                  analyze and better understand the security
                  requirements of sensor networks. This talk
                  provides a comprehensive taxonomy of security
                  attacks on sensor networks, and outlines the
                  existing solutions for each set of attacks and
                  points out the research directions which need to
                  be further investigated in the future.},
        URL = {http://www.truststc.org/pubs/138.html}
    }
    

Posted by Alvaro Cardenas on 15 Nov 2006.
For additional information, see the Publications FAQ or contact webmaster at www truststc org.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.