Sensor Network Security with Random Key Predistribution

Lianyu Zhao, Richard R. Brooks, Brijesh Pillai, P. Y. Govindaraju, Matthew Pirretti, Vijaykrishnan Narayanan, Mahmut Kandemir

Research output: Chapter in Book/Report/Conference proceedingChapter

Abstract

Although sensor networks are supposed to be highly independent and require little supervision, sensor networks deployed in hostile environment are subjected to all kinds of attacks. For example, in ColTraNe [1], sensors are deployed in hostile terrain to track the movements of enemy tanks. Attacks could be initialized by the enemy to maliciously capture, modify the compromised sensor nodes, or even inject information to them.

Original languageEnglish (US)
Title of host publicationDistributed Sensor Networks
Subtitle of host publicationSecond Edition: Sensor Networking and Applications
PublisherCRC Press
Pages201-222
Number of pages22
ISBN (Electronic)9781439862889
ISBN (Print)9781466538412
DOIs
StatePublished - Jan 1 2016

All Science Journal Classification (ASJC) codes

  • General Computer Science
  • General Engineering

Fingerprint

Dive into the research topics of 'Sensor Network Security with Random Key Predistribution'. Together they form a unique fingerprint.

Cite this