TY - CHAP
T1 - Key management in wireless sensor networks
T2 - Challenges and solutions
AU - Zhou, Yun
AU - Zhang, Yanchao
AU - Fang, Yuguang
N1 - Publication details (e.g. title, author(s), publication statuses and dates) are captured on an “AS IS” and “AS AVAILABLE” basis at the time of record harvesting from the data source. Suggestions for further amendments or supplementary information can be sent to [email protected].
PY - 2006/1/1
Y1 - 2006/1/1
N2 - Wireless sensor networks (WSNs) [1] have been seen as a promising network infrastructure for many military applications, such as battlefield surveillance and homeland security monitoring. In those hostile tactical scenarios and important commercial applications, security mechanisms are necessary to protect WSNs from malicious attacks.
AB - Wireless sensor networks (WSNs) [1] have been seen as a promising network infrastructure for many military applications, such as battlefield surveillance and homeland security monitoring. In those hostile tactical scenarios and important commercial applications, security mechanisms are necessary to protect WSNs from malicious attacks.
UR - http://www.scopus.com/inward/record.url?scp=47849087119&partnerID=8YFLogxK
UR - https://www.scopus.com/record/pubmetrics.uri?eid=2-s2.0-47849087119&origin=recordpage
U2 - 10.1201/9781420013610-22
DO - 10.1201/9781420013610-22
M3 - RGC 12 - Chapter in an edited book (Author)
SN - 9781420013610
SN - 0849380367
SN - 9780849380365
SP - 445
EP - 475
BT - Resource, Mobility, and Security Management in Wireless Networks and Mobile Communications
PB - CRC Press
ER -