From an application’s point of view, the driving force
behind research in WSNs is to develop systems that
can operate unattended for large periods. Besides energy
consumption considerations, the unattended nature of
the deployed WSNs raises administration problems and
appoints the security as an additional critical element in
the network design [3]. As identified in [4-6], WSNs are
susceptible to various types of attacks or to node compromises
that exploit known and unknown vulnerabilities
of protocols, software, and hardware, and threaten the
security, integrity, authenticity, and availability of data that
reside in these networked systems.
From an application’s point of view, the driving forcebehind research in WSNs is to develop systems thatcan operate unattended for large periods. Besides energyconsumption considerations, the unattended nature ofthe deployed WSNs raises administration problems andappoints the security as an additional critical element inthe network design [3]. As identified in [4-6], WSNs aresusceptible to various types of attacks or to node compromisesthat exploit known and unknown vulnerabilitiesof protocols, software, and hardware, and threaten thesecurity, integrity, authenticity, and availability of data thatreside in these networked systems.
การแปล กรุณารอสักครู่..
