http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
A Survey on Key Management Strategies for Different Applications of Wireless Sensor Networks
Raazi, Syed Muhammad Khaliq-Ur-Rahman,Lee, Sung-Young Korean Institute of Information Scientists and Eng 2010 Journal of Computing Science and Engineering Vol.4 No.1
Wireless Sensor Networks (WSN) have proved to be useful in applications that involve monitoring of real-time data. There is a wide variety of monitoring applications that can employ Wireless Sensor Network. Characteristics of a WSN, such as topology and scale, depend upon the application, for which it is employed. Security requirements in WSN vary according to the application dependent network characteristics and the characteristics of an application itself. Key management is the most important aspect of security as some other security modules depend on it. We discuss application dependent variations in WSN, corresponding changes in the security requirements of WSN and the applicability of existing key management solutions in each scenario.
A novel architecture for localized key management in wireless sensor networks
( Syed Muhammad Khaliq-ur-rahman Raazi ),( Sungyoung Lee ),( Young Jae Song ),( Young Koo Lee ) 한국정보처리학회 2007 한국정보처리학회 학술대회논문집 Vol.14 No.1
Wireless sensor networks (WSN) can be used in military surveillance, in which highly confidential data needs to be transmitted. In effect, security becomes a very important aspect in such networks. We present an efficient key management scheme for WSN. Our scheme is an improvement over SHELL [1] and mostly relies on communication within a cluster of nodes.