Please wait a minute...
Computer & Telecommunication  2018, Vol. 1 Issue (12): 84-86    DOI:
Current Issue | Archive | Adv Search |
Analysis of WSN Network Security Management Mechanism
Zibo Vocational College
Download:   PDF(0KB)
Export: BibTeX | EndNote (RIS)      
Abstract  Most applications of WSN are based on the location information of nodes. The events monitored by WSN are closely related to the physical location information of nodes. Without location information, the monitoring data is meaningless, and the location information of nodes is closely related to network security. Therefore, the network security management of WSN is very important. This paper briefly describes the characteristics and applications of WSN, analyses the network security characteristics and requirements of WSN, and discusses two kinds of network security management mechanisms of WSN: key management and security location.
Key wordsWSN      network security      management mechanism     
Published: 30 July 2019
ZTFLH:  TP212.9  
  TN918.4  

Cite this article:

FAN Miao-miao. Analysis of WSN Network Security Management Mechanism. Computer & Telecommunication, 2018, 1(12): 84-86.

URL:

http://www.computertelecom.com.cn/EN/     OR     http://www.computertelecom.com.cn/EN/Y2018/V1/I12/84

[1] CAO Jia-qiGU ShuangLI Ru-peng. Solar Charging System Based on WSN Node Energy Supplement[J]. 电脑与电信, 2021, 1(5): 4-7.
[2] XIA Yu-hong XIA Wen-zhong. Design and Implementation of WSN Smart Library Environment Awareness System[J]. 电脑与电信, 2021, 1(4): 33-35.
[3] ZHUANG Yuan-xiang. Teaching Research on Network Security in Technical Schools[J]. 电脑与电信, 2021, 1(1): 62-67.
[4] WANG Yu HE Zhen-xiang. Research on the Intrusion Detection Method Based on Machine LearningAlgorithm[J]. 电脑与电信, 2020, 1(7): 1-3.
[5] JIANG Yi ZHU Jun-wu. Research on the Intrusion Detection Method Based on Machine LearningAlgorithm[J]. 电脑与电信, 2020, 1(7): 21-24.
[6] XIE Feng MENG Jin DING Wei REN Zhao-peng . Overview of Network Structure Transformation and Network Security Construction Based on MajorActivities Guarantee[J]. 电脑与电信, 2020, 1(6): 57-62.
[7] ZHONG Yu-ming CHEN Chang-hui. Exploration of Network and Information Security[J]. 电脑与电信, 2020, 1(5): 33-35.
[8] ZHOU Xiao-juan. Discussion on the Computer Network Security and Preventive Measures in the Era of Big Data[J]. 电脑与电信, 2020, 1(3): 41-43.
[9] CAI Chang-hao LU Chang-xing HATe SUN Ruo-xi XIN Yu-liang. Research on User Privacy Protection Method in Logistics Industry[J]. 电脑与电信, 2020, 1(12): 75-79.
[10] ZHANG Yu. Application of DES File Encryption in Network Security[J]. 电脑与电信, 2019, 1(7): 49-.
[11] JIANG Lin-zhou. Man-in-the-middle Attack and Defense Methods in Wireless Networks[J]. 电脑与电信, 2019, 1(5): 48-50.
[12] YIN Dong, MI Chun-qiao, ZHANG Xian, SHU Hui-xia. Exploration and Practice of Innovation and Entrepreneurship Base for University Students under the Cooperation between School and Enterprise[J]. 电脑与电信, 2018, 1(4): 7-8.
[13] YE Zheng-qiang , LI Jia . Design and Deployment of Enterprise Network Security Scheme[J]. 电脑与电信, 2018, 1(1-2): 53-54.
[14] Xie Fan. Analysis on the Computer Network Security and Router Troubleshooting[J]. 电脑与电信, 2017, 1(7): 42-43.
[15] Li Fangjun. The Application of Data Encryption Technology in Computer Network Communication Security[J]. 电脑与电信, 2017, 1(5): 59-61.
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd