21.08.2013 Views

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

96 Chapter 3. A Security Model <strong>for</strong> <strong>Wireless</strong> <strong>Sensor</strong> <strong>Networks</strong><br />

As we concluded that end-to-end mechanisms would be either too costly or<br />

too constra<strong>in</strong><strong>in</strong>g <strong>in</strong> many applications of wireless sensor networks, we considered<br />

the approximation of end-to-end security as an alternative approach that<br />

provides a level of security that is sufficient <strong>for</strong> many purposes and may deter<br />

potential attackers <strong>in</strong> many cases.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!