dc.contributor.author | Stavrou, E. | en |
dc.contributor.author | Pitsillides, A. | en |
dc.contributor.author | Hadjichristofi, G. | en |
dc.contributor.author | Hadjicostis, Christoforos N. | en |
dc.creator | Stavrou, E. | en |
dc.creator | Pitsillides, A. | en |
dc.creator | Hadjichristofi, G. | en |
dc.creator | Hadjicostis, Christoforos N. | en |
dc.date.accessioned | 2019-04-08T07:48:21Z | |
dc.date.available | 2019-04-08T07:48:21Z | |
dc.date.issued | 2010 | |
dc.identifier.isbn | 978-989-8425-18-8 | |
dc.identifier.uri | http://gnosis.library.ucy.ac.cy/handle/7/44892 | |
dc.description.abstract | Existing security research in wireless sensor networks is based on specific assumptions about the nodes and the network environment that are tied to specific usage scenarios. Typical scenarios consider sensor nodes that are immobile and have pre-defined communication patterns. We argue that node mobility is a realistic characteristic of sensor nodes that needs to be taken into consideration in future sensor networks. Mobility capabilities can address the objective challenges raised in mission-critical applications, such as in disaster relief, where their environment characteristics fluctuate over time. It is imperative to investigate the way security is affected in mobile sensor networks and identify the challenges that will need to be addressed in future security protocol design. We present our vision for future sensor networks through a realistic scenario and discuss security gaps that are present in existing research for next generation sensor networks. | en |
dc.source | SECRYPT 2010 - Proceedings of the International Conference on Security and Cryptography | en |
dc.source | SECRYPT 2010 - Proceedings of the International Conference on Security and Cryptography | en |
dc.source.uri | https://www.scopus.com/inward/record.uri?eid=2-s2.0-78651452657&partnerID=40&md5=8df5b9953c2c920cbd11a6e7d1d5c84d | |
dc.subject | Security | en |
dc.subject | Network protocols | en |
dc.subject | Sensor networks | en |
dc.subject | Sensor nodes | en |
dc.subject | Telecommunication equipment | en |
dc.subject | Wireless sensor networks | en |
dc.subject | Network management | en |
dc.subject | Network security | en |
dc.subject | Disaster prevention | en |
dc.subject | Disaster relief | en |
dc.subject | Cryptography | en |
dc.subject | Realistic scenario | en |
dc.subject | Communication pattern | en |
dc.subject | Environment characteristic | en |
dc.subject | Issues and challenges | en |
dc.subject | Key management | en |
dc.subject | Mission critical applications | en |
dc.subject | Mobile sensor networks | en |
dc.subject | Mobility capabilities | en |
dc.subject | Network environments | en |
dc.subject | Node mobility | en |
dc.subject | Routing | en |
dc.subject | Security gap | en |
dc.subject | Security protocols | en |
dc.subject | Security research | en |
dc.subject | Trust management | en |
dc.subject | Usage scenarios | en |
dc.title | Security in future mobile sensor networks - Issues and challenges | en |
dc.type | info:eu-repo/semantics/conferenceObject | |
dc.description.startingpage | 278 | |
dc.description.endingpage | 286 | |
dc.author.faculty | Πολυτεχνική Σχολή / Faculty of Engineering | |
dc.author.department | Τμήμα Ηλεκτρολόγων Μηχανικών και Μηχανικών Υπολογιστών / Department of Electrical and Computer Engineering | |
dc.type.uhtype | Conference Object | en |
dc.contributor.orcid | Hadjicostis, Christoforos N. [0000-0002-1706-708X] | |
dc.gnosis.orcid | 0000-0002-1706-708X | |