Download Now Free registration required
Achieving security in resource-constrained wireless sensor networks is a challenging research task. Many key management schemes have been developed recently to provide secure communication between source and destination in wireless sensor networks. A serious threat highlighted in all of these schemes is that of node capture attacks, where an adversary gains full control over a sensor node through direct physical access. The compromised sensor node can be an aggregator node, cluster head node or a normal sensor node. This can lead an adversary to compromise the communication of an entire sensor network which creates a high risk for data confidentiality. Solving this problem with limited resources is a major challenge.
- Format: PDF
- Size: 387.8 KB