Wireless Sensor Networks: Emerging Applications and Security Solutions

Wireless Sensor Networks: Emerging Applications and Security Solutions

Sumita Mishra
ISBN13: 9781609607777|ISBN10: 1609607775|EISBN13: 9781609607784
DOI: 10.4018/978-1-60960-777-7.ch011
Cite Chapter Cite Chapter

MLA

Mishra, Sumita. "Wireless Sensor Networks: Emerging Applications and Security Solutions." Network Security, Administration and Management: Advancing Technology and Practice, edited by Dulal Chandra Kar and Mahbubur Rahman Syed, IGI Global, 2011, pp. 217-236. https://doi.org/10.4018/978-1-60960-777-7.ch011

APA

Mishra, S. (2011). Wireless Sensor Networks: Emerging Applications and Security Solutions. In D. Kar & M. Syed (Eds.), Network Security, Administration and Management: Advancing Technology and Practice (pp. 217-236). IGI Global. https://doi.org/10.4018/978-1-60960-777-7.ch011

Chicago

Mishra, Sumita. "Wireless Sensor Networks: Emerging Applications and Security Solutions." In Network Security, Administration and Management: Advancing Technology and Practice, edited by Dulal Chandra Kar and Mahbubur Rahman Syed, 217-236. Hershey, PA: IGI Global, 2011. https://doi.org/10.4018/978-1-60960-777-7.ch011

Export Reference

Mendeley
Favorite

Abstract

Wireless sensor networking technology has been used extensively by both commercial and military applications for sensing and data collection purposes. The self-configuring, self-healing nature and the ease of deployment of these networks make them an attractive option to other centralized approaches. Most of the existing networking solutions for sensor networks focus on the communication aspects and do not address the data security concerns of these networks. Since sensor networks are being deployed for emerging applications involving sensitive data and are envisioned to be integrated with the cyber space, it is essential to address the security needs of wireless sensor networks. Designing security solutions for Wireless Sensor Networks is an extremely challenging task due to the resource constraints of sensor nodes and the distributed nature of network design. This chapter provides an overview of emerging sensor networks involving sensitive data and a discussion of some of the proposed security solutions.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.