On data gathering and security in wireless sensor networks

Hidehisa Nakayama, Nirwan Ansari, Abbas Jamalipour, Yoshiaki Nemoto, Nei Kato

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Scopus citations

Abstract

Expected growth in use and implementation of wireless sensor networks (WSNs) in different environments and for different applications creates new security challenges. In WSNs, a malicious node may initiate incorrect path information, change the contents of data packets, and even hijack one or more genuine network nodes. As the network reliability completely depends on individual nodes' presence and collaborations with others, those malicious behaviors could halt WSNs. In this paper, the WSNs will be first categorized into three types in accordance to the way that data are collected. After a succinct summarization of each data gathering scheme, a comprehensive survey on security problems will be presented. Finally, some general design guidelines against typical attacks along with our proposals in WSNs will be provided. Unsolved problems and further studies will also be discussed.

Original languageEnglish (US)
Title of host publication2007 IEEE Sarnoff Symposium, SARNOFF
DOIs
StatePublished - Dec 1 2007
EventIEEE Sarnoff Symposium, SARNOFF 2007 - Princeton, NJ, United States
Duration: Apr 30 2007May 2 2007

Publication series

Name2007 IEEE Sarnoff Symposium, SARNOFF

Other

OtherIEEE Sarnoff Symposium, SARNOFF 2007
CountryUnited States
CityPrinceton, NJ
Period4/30/075/2/07

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Information Systems
  • Electrical and Electronic Engineering
  • Communication

Fingerprint Dive into the research topics of 'On data gathering and security in wireless sensor networks'. Together they form a unique fingerprint.

Cite this