Security in Wireless Sensor Networks
DOI:
https://doi.org/10.18046/syt.v7i13.1006Keywords:
Attacker, MAC, key management, limited resources, security, sensor node.Abstract
This article presents a survey of the state of art of the mechanisms to provide security to the Wireless Sensor Networks. Over the principal schemes, are the key management and cryptography, the authentication protocols and the mechanisms of clone or intrusion detection.
Downloads
Published
Issue
Section
License
This journal is licensed under the terms of the CC BY 4.0 licence (https://creativecommons.org/licenses/by/4.0/legalcode).