IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Survivability of Sensors with Key and Trust Management

Survivability of Sensors with Key and Trust Management
View Sample PDF
Author(s): Jean-Marc Seigneur (University of Genev, Switzerland), Luminita Moraru (University of Genev, Switzerland) and Olivier Powell (University of Patras, Greece)
Copyright: 2008
Pages: 16
Source title: Handbook of Research on Wireless Security
Source Author(s)/Editor(s): Yan Zhang (Simula Research Laboratory, Norway), Jun Zheng (City University of New York, USA) and Miao Ma (National Institute of Information & Communications Tech, Singapore)
DOI: 10.4018/978-1-59904-899-4.ch039

Purchase

View Survivability of Sensors with Key and Trust Management on the publisher's website for pricing and purchasing information.

Abstract

Weiser (1991) envisioned ubiquitous computing with computing and communicating entities woven into the fabrics of every day life. This chapter deals with the survivability of ambient resource-constrained wireless computing nodes, from fixed sensor network nodes to small devices carried out by roaming entities, for example, as part of a personal area network of a moving person. First, we review the assets that need to be protected, especially the energy of these unplugged devices. There are also a number of specific attacks that are described, for example, direct physical attacks are facilitated by the disappearing security perimeter. Finally, we survey the protection mechanisms that have been proposed with an emphasis on cryptographic keying material and trust management.

Related Content

. © 2021. 31 pages.
. © 2021. 23 pages.
. © 2021. 20 pages.
. © 2021. 29 pages.
. © 2021. 27 pages.
. © 2021. 20 pages.
. © 2021. 20 pages.
Body Bottom