Your cart is currently empty!

ISO 29180:2012
ISO 29180:2012 Information technology – Telecommunications and information exchange between systems – Security framework for ubiquitous sensor networks
CDN $273.00
Description
The recent advancement of wireless-based communication technology and electronics has facilitated the implementation of a low-cost, low-power sensor network. Basically, a ubiquitous sensor network (USN) consists of three parts: a sensor network consisting of a large number of sensor nodes, a base station (also known as a gateway) interfacing between the sensor network and an application server, and the application server controlling the sensor node in the sensor network or collecting the sensed information from the sensor nodes in the sensor network.
ISO/IEC 29180:2012 describes the security threats to and security requirements of the USN. In addition, it categorizes the security technologies according to the security functions that satisfy the said security requirements and where the security technologies are applied in the security model of the USN. Finally, the security functional requirements and security technologies for the USN are presented.
Edition
1
Published Date
2012-11-30
Status
PUBLISHED
Pages
34
Format 
Secure PDF
Secure – PDF details
- Save your file locally or view it via a web viewer
- Viewing permissions are restricted exclusively to the purchaser
- Device limits - 3
- Printing – Enabled only to print (1) copy
See more about our Environmental Commitment

Abstract
The recent advancement of wireless-based communication technology and electronics has facilitated the implementation of a low-cost, low-power sensor network. Basically, a ubiquitous sensor network (USN) consists of three parts: a sensor network consisting of a large number of sensor nodes, a base station (also known as a gateway) interfacing between the sensor network and an application server, and the application server controlling the sensor node in the sensor network or collecting the sensed information from the sensor nodes in the sensor network.
ISO/IEC 29180:2012 describes the security threats to and security requirements of the USN. In addition, it categorizes the security technologies according to the security functions that satisfy the said security requirements and where the security technologies are applied in the security model of the USN. Finally, the security functional requirements and security technologies for the USN are presented.
Previous Editions
Can’t find what you are looking for?
Please contact us at:
Related Documents
-
ISO 16520:2025 Tourism and related services – Restaurants and catering – Vocabulary
0 out of 5CDN $173.00 Add to cart -
ISO 14416:2003 Information and documentation – Requirements for binding of books, periodicals, serials and other paper documents for archive and library use – Methods and materials
0 out of 5CDN $273.00 Add to cart -
ISO 80004:2011 Nanotechnologies – Vocabulary – Part 7: Diagnostics and therapeutics for healthcare
0 out of 5CDN $115.00 Add to cart -
ISO 80004:2021 Nanotechnologies – Vocabulary – Part 6: Nano-object characterization
0 out of 5CDN $76.00 Add to cart