Study of Security Technology in Wireless Sensor Networks

Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 219)


Due to its own characteristics, wireless sensor networks are different from the wired network security issues in the operating system and network protocol design. ZigBee technology, for example, is the use of security technology to analyze its security features and security requirements from multiple perspectives, and describes the specific application of the ZigBee network security encryption technology.


Wireless sensor network Security Encryption technology 


  1. 1.
    Liu Z (2008) Wireless sensor networks in a secure LEACH protocol. Comput Sci 09:2813–2815Google Scholar
  2. 2.
    Tan Z, Huang T (2010) Zigbee wireless sensor network security research and improvement. Comput Inf 08:54–55Google Scholar
  3. 3.
    Wright MA (2001) The advanced encryption standard. Netw Secur 02:11–13CrossRefGoogle Scholar
  4. 4.
    Xu X, Gao Y, Zhang W (2009) Research and discussion based on the IEEE 802.15.4 ZigBee wireless. Netw Data Transm Secur Inf Netw Secur 06:10–12Google Scholar
  5. 5.
    Chen X (2010) Wireless sensor network-based security policy. Digit Technol Appl 05:100–103Google Scholar
  6. 6.
    Cao J, Zhang Z (2011) Wireless sensor network security improvement program. Mod Electron Technol 12:38–40Google Scholar
  7. 7.
    Wang Y, Wei Wei, Lu D (2008) Review of the wireless sensor network security. Comput Age 12:15–19MathSciNetGoogle Scholar
  8. 8.
    Li J, Sun Y (2010) ZigBee-based wireless personal area network security mechanisms. World Digit Commun 07:68–70Google Scholar

Copyright information

© Springer-Verlag London 2013

Authors and Affiliations

  1. 1.Liuzhou City Vocational CollegeLiuzhouChina

Personalised recommendations