By Topic

On data gathering and security in wireless sensor networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

5 Author(s)
Nakayama, H. ; Grad. Sch. of Inf. Sci., Tohoku Univ., Sendai ; Ansari, N. ; Jamalipour, A. ; Nemoto, Y.
more authors

Expected growth in use and implementation of wireless sensor networks (WSNs) in different environments and for different applications creates new security challenges. In WSNs, a malicious node may initiate incorrect path information, change the contents of data packets, and even hijack one or more genuine network nodes. As the network reliability completely depends on individual nodespsila presence and collaborations with others, those malicious behaviors could halt WSNs. In this paper, the WSNs will be first categorized into three types in accordance to the way that data are collected. After a succinct summarization of each data gathering scheme, a comprehensive survey on security problems will be presented. Finally, some general design guidelines against typical attacks along with our proposals in WSNs will be provided. Unsolved problems and further studies will also be discussed.

Published in:

Sarnoff Symposium, 2007 IEEE

Date of Conference:

April 30 2007-May 2 2007