Analysis of security threats, requirements, technologies and standards in ireless sensor networks

97Citations
Citations of this article
83Readers
Mendeley users who have this article in their library.
Get full text

Abstract

As sensor networks are more and more being implemented in real world settings, it is necessary to analyze how the different requirements of these real-world applications can influence the security mechanisms. This paper offers both an overview and an analysis of the relationship between the different security threats, requirements, applications, and security technologies. Besides, it also overviews some of the existing sensor network standards, analyzing their security mechanisms. © 2009 Springer Berlin Heidelberg.

Cite

CITATION STYLE

APA

Lopez, J., Roman, R., & Alcaraz, C. (2009). Analysis of security threats, requirements, technologies and standards in ireless sensor networks. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5705 LNCS, pp. 289–338). https://doi.org/10.1007/978-3-642-03829-7_10

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free