КЕРІВНІ ПРИНЦИПИ ТА ПІДХОДИ ДО ЗАХИСТУ ІНФОРМАЦІЇ У БЕЗПРОВОДОВИХ СЕНСОРНИХ МЕРЕЖАХ
Анотація
Guiding principles and approaches
to information security in Wireless Sensor Networks
Wireless sensor networks (WSN) have many applications in our time. For example in military, rescue works and other areas. WSN have many sensors which can be located in hostile territory. If we want save confidential information, we mustensure information security when it is transmitted over the network. That’s why we need to know Guiding principles and approaches to information security.
Посилання
Chris Karlof and David Wagner, “Secure routing in wireless sensor networks: attacks and countermeasures”, Ad Hoc Networks, Elsevier Publications, 2003.
T.Kavitha and D.Sridharan, “Security Vulnerabilities In Wireless Sensor Networks: A Survey”, Journal of Information Assurance and Security (2010), 2010.
Murat Dener, “Security Analysis in Wireless Sensor Networks”, year 2014.
Половко А.М., Гуров С. В. Основитеоріїнадійності. – СПб.: БХВ-Петербург 2006. – 560 с.
##submission.downloads##
Як цитувати
Номер
Розділ
Ліцензія
Авторське право (c) 2018 Олена Сергіївна Туранська, Валентина Миколаївна Петрова
Ця робота ліцензується відповідно до Creative Commons Attribution 4.0 International License.
Authors who submit to this conference agree to the following terms:a) Authors retain copyright over their work, while allowing the conference to place this unpublished work under a Creative Commons Attribution License, which allows others to freely access, use, and share the work, with an acknowledgement of the work's authorship and its initial presentation at this conference.
b) Authors are able to waive the terms of the CC license and enter into separate, additional contractual arrangements for the non-exclusive distribution and subsequent publication of this work (e.g., publish a revised version in a journal, post it to an institutional repository or publish it in a book), with an acknowledgement of its initial presentation at this conference.
c) In addition, authors are encouraged to post and share their work online (e.g., in institutional repositories or on their website) at any point before and after the conference.