МЕТОДИ ПІДВИЩЕННЯ БЕЗПЕКИ В БЕЗПРОВОДОВИХ СЕНСОРНИХ МЕРЕЖАХ
Анотація
Methods to Improve Security in Wireless Sensor Network
Currently, wireless sensor networks (BSN) are one of the most promising areas in the development of telecommunications system. The wireless sensor network (BSN) is a technology, which is a self-organizing network of a large number of sensors and devices that are connected to each other via a radio channel. Security and privacy are of great importance in wireless sensor networks, where the unique characteristics of these networks and the purpose of the application they use make them attractive targets for penetration and other attacks.
Посилання
John Paul Walters, Zhengqiang Liang, Weisong Shi, Vipin Chaudhary, “Wireless Sensor Network Security: A Survey”, Security in Distributed, Grid and Pervasive Computing Yang Xiao (Eds), Page3-5, 10—15, year 2006.
Adrian Perrig, John Stankovic, David Wagner, “Security in Wireless Sensor Networks” Communications of the ACM, Page 53—57, year 2004.
Pathan A.S.K.; Hyung-Woo Lee; Choong Seon Hong, “Security in wireless sensor networks: issues and challenges” Advanced Communication echnology (ICACT), Page(s):6, year 2006.
Zia T.; Zomaya A., “Security Issues in Wireless Sensor Networks”, Systems and Networks Communications (ICSNC) Page(s):40—40, year 2006.
##submission.downloads##
Як цитувати
Номер
Розділ
Ліцензія
Авторське право (c) 2018 Ярослав Романович Афанасьєв, Валерій Іванович Новіков
Ця робота ліцензується відповідно до Creative Commons Attribution 4.0 International License.
Authors who submit to this conference agree to the following terms:a) Authors retain copyright over their work, while allowing the conference to place this unpublished work under a Creative Commons Attribution License, which allows others to freely access, use, and share the work, with an acknowledgement of the work's authorship and its initial presentation at this conference.
b) Authors are able to waive the terms of the CC license and enter into separate, additional contractual arrangements for the non-exclusive distribution and subsequent publication of this work (e.g., publish a revised version in a journal, post it to an institutional repository or publish it in a book), with an acknowledgement of its initial presentation at this conference.
c) In addition, authors are encouraged to post and share their work online (e.g., in institutional repositories or on their website) at any point before and after the conference.