21.08.2013 Views

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

64 Chapter 2. <strong>Wireless</strong> <strong>Sensor</strong> <strong>Networks</strong> and Their Security<br />

2.10 Summary<br />

This chapter highlighted several aspects of wireless sensor networks, thus establish<strong>in</strong>g<br />

the technical context of this work. By consider<strong>in</strong>g the capabilities<br />

and limitations of WSNs, we are able to <strong>for</strong>mulate high-level security requirements.<br />

The cryptographic foundations <strong>for</strong> meet<strong>in</strong>g these requirements have<br />

been laid out.<br />

We have also reviewed the exist<strong>in</strong>g relevant approaches to WSN security.<br />

Build<strong>in</strong>g on this knowledge, we proceed to describe a security model <strong>for</strong> WSNs,<br />

which will be the basis <strong>for</strong> the follow<strong>in</strong>g security protocols we propose.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!