Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Transducer and Microsystem Technologies》 2007-02
Add to Favorite Get Latest Update

Design of cross-layer security for wireless sensor network's

YANG Guang-song1,CHEN Chao-yang1,XIAO Ming-bo2(1.School of Information Engineering,Jimei University,Xiamen 361021,China;2.Department of Communication Engineering,Xiamen University,Xiamen 361005,China)  
Wireless sensor networks(WSNs) are developing rapidly,it will be employed in a wide variety of applications ranging from military,industrial and social.Due to their constraints in computation,memory,and power resources,security is a challenge in these networks.Many security methods of WSNs based on the concept of layered-design have the limit,the state of art security design method of WSNs is overviewed,several new cross-layer solve methods are proposed,and the research direction of cross-layer design for the security of WSNs is point out.
【Fund】: 福建省自然科学基金资助项目(A00440004)
【CateGory Index】: TP212.9;TP393.08
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【Co-citations】
Chinese Journal Full-text Database 10 Hits
1 YING Bi-di,CHEN Hui-fang,ZHAO Wen-dao,QIU Pei-liangDept.of Information Science and Electronic Engineering Zhejiang Univ.Hangzhou 310027,China;Low-Power Key Pre-Distribution Scheme in Wireless Sensor Networks[J];Chinese Journal of Sensors and Actuators;2007-07
2 JIANG Yi,SHI Hao-shan(School of Electronics and Information,Northwestern Polytechnical University,Xi'an 710072,China);Merkle Tree Based Broadcast Authentication Strategies in Wireless Sensor Networks[J];Chinese Journal of Sensors and Actuators;2007-07
3 FANG Qian,ZHAO Xiao-qun*(College of electronic and information engineering,Tongji university,shanghai 200092,China);A Secure Geographic Integrated Protocol for Wireless Sensor Networks[J];Chinese Journal of Sensors and Actuators;2008-05
4 WU Di,HU Gang,NI Gang,LI Wei,ZHANG Zhuo(College of Computer and Information Engineering,Hohai University,Changzhou Jiangsu 213022,China);Research on Secure Routing Protocols in Wireless Sensor Networks[J];Chinese Journal of Sensors and Actuators;2008-07
5 PANG Liao-jun1,2,LI Hui-xian3,JIAO Li-cheng2,WANG Yu-min11.The Ministry of Edu.Key Lab.of Computer Networks and Information Security,Xidian University,Xi'an 710071,China;2.Institute of Intelligent Information Processing,Xidian University,Xi'an 710071,China;3.School of Comput.Sci.,Northwestern Polytechnical Univ,Xi'an 710072,China;Broadcast Key Distribution Protocol of Wireless Sensor Networks Based on Secret Sharing[J];Chinese Journal of Sensors and Actuators;2008-10
6 PAN Julong1,2,LI Shanping1,WU Zhendong3,ZHANG Daoyuan21.College of Computer Science,Zhejiang University,Hangzhou 310027,China;2.Department of Computer,China Jiliang University,Hangzhou 310018,China;3.College of Comm.Eng.,Hangzhou Dianzi University,Hangzhou 310018,China;A Design of Secure Community Healthcare Monitoring System Based on Wireless Sensor Networks[J];Chinese Journal of Sensors and Actuators;2009-06
7 ZHOU Quan1,ZHOU Xiao-dong2(1.Institute of Information Security,Guangzhou University,Guangzhou 510006,China;2.West Sichuan Drilling Corp,Chengdu 610011,China);Trusted routing protocol based on cluster head for wireless sensor networks[J];Transducer and Microsystem Technologies;2008-10
8 YANG Li-juan,HUANG Dao-chang,LI Yuan-ping(College of Computer and Communication Engineering,Changsha University of Science and Technology,Changsha 410076,China);Research on key management in Wireless Sensor Network[J];Journal of Changsha Communications University;2008-01
9 WANG Gang1,WEN Tao1,2,GUO Quan2,MA Xue-bin1(1.Software Center,Northeastern University,Shenyang 110004,China;2.Department of Computer Science and Technology,Neusoft Information Institute,Dalian 116023,China.);A Cluster-Based Security Protocol in Wireless Sensor Networks[J];Journal of Northeastern University(Natural Science);2009-01
10 Zhang Zhijiang1,2 Zhu Liehuang1 Tang Hong1(1 School of Computer Science and Technology,Beijing Institute of Technology,Beijing 100081,China)(2 The Electronic Technology Institute of Air Force,Beijing 100195,China);Security and authentication scheme for hierarchical wireless sensor networks[J];Journal of Southeast University(Natural Science Edition);2008-S1
China Proceedings of conference Full-text Database 6 Hits
1 CHEN Shuai a,ZHONG Xianxin b,LIAO Xiaowei a,SHI Junfeng b aElectronic staff room in physics department,Huainan Normal University,Huainan,Anhui,China,232001;bKey Lab for Optoelectronic Technology&System of China Ministry of Education,Chongqing University,Chongqing 400030;Prolong Minimum Period of Integer Chaos Child Key for Wireless Sensor Network Security[A];[C];2007
2 Fang Qian ZhaoXiaoqun (College of Electronic& Information Engineering,Tongji University,Shanghai,200092,China);A Secure Geographic Stateless Routing for Wireless Sensor Networks[A];[C];2008
3 ZHANG Jizan School of Mathematics and Message,Ludong University,Yantai 264025;A Key Distribution Scheme Based on Layers in Clustered Wireless Sensor Network[A];[C];2008
4 Zhang Zhijiang~(1,2) Tang Hong~1 Zhu Liehuang~1 Wang Zhiyuan~3 ~1 Beijing Laboratory of Intelligent Information Technology,School of Computer Science,Beijing Institute of Technology,Beijing 100081; ~2 The Electronic Technology Institute of Air Force,Beijing 100089; ~3 PLA Information Engineering College Information Technology Institute,Zhenzhou 450002;A Certificate-Based Security and Authentication Scheme for Wireless Sensor Networks[A];[C];2008
5 Wang Jianqiu1,2 Lang Weimin3 Ji Yinghua1 (1 College of Physics and Communication Electronics, Jiangxi Normal University, Nanchang, 330027, China; 2 College of Electronic and Information Engineering,Wuhan Institute of Technology, Wuhan, 430074, China; 3 PLA Communication Commands Academy, Wuhan, 430010, China);Research on the Security in Wireless Sensor Network[A];[C];2008
6 Zhao Zhibin,Dong Xiaomei,Yao Lan,Yu Ge Faculty of Information Science and Engineering,Northeastern University,Shenyang 110004,China;Research on Biological Immunity Principle Based Security Model for Wireless Sensor Network[A];[C];2009
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved