ABSTRACT
Wireless sensor network has emerged as a new information and data gathering paradigm based on the collaborative efforts of a large number of autonomous sensing devices. With small memories and processors, limited energy and tiny packets, sensor networks cannot afford traditional luxury security solutions; this limitation causes security threats. There are several important security challenges, including access control, message integrity and confidentiality, and trust solutions that require us to use a careful design of resource constraints for pursuing more enhanced security solutions for a wireless sensor network. In this paper, we present a new idea of persistent security solutions that support trust for general purpose Wireless Sensor Networks.
- Karlof, C. and D. Wagner, "Secure routing in wireless sensor networks: attacks and countermeasures", Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003, p. 113--127.Google ScholarCross Ref
- Bellare, M., et al., "A concrete security treatment of symmetric encryption", Proceedings of the 38th IEEE Symposium on Foundations of Computer Science, 1997: p. 394--403. Google ScholarDigital Library
- Chan, H., A. Perrig, and D. Song, "Random key predistribution schemes for sensor Networks", Symposium on Security and Privacy, 2003: p. 197--213. Google ScholarDigital Library
- Eschenauer, L. and V. D. Gligor, "A Key-Management Scheme for Distributed Sensor Networks", Proceedings of the 9th ACM conference on Computer and communications security, 2002: p. 41--47. Google ScholarDigital Library
- Bellare, M., J. Kilian, and P. Rogaway, "The Security of the Cipher Block Chaining Message Authentication Code", J. COMPUT. SYST. SCI, 2000. 61(3): p. 362--399. Google ScholarDigital Library
- Schneier, B., Applied cryptography. 1996: John Wiley & Sons New York.Google Scholar
- Levis, P., et al., "TinyOS: An operating system for wireless sensor networks", Ambient Intelligence, 2004.Google Scholar
- Molla, M., Ahamed, S. I., "A Survey of Middleware for Sensor Network and Challenges", ICPP Workshops 2006: p. 223--228 Google ScholarDigital Library
Recommendations
Routing in Wireless Sensor Network Using Fuzzy Based Trust Model
CSNT '14: Proceedings of the 2014 Fourth International Conference on Communication Systems and Network TechnologiesWireless sensor network is a collection of large number of sensor nodes that are deployed in large number to monitor the environment. There is a great technological advancement in wireless sensor network during last few years. Due to low-cost, small-...
Soft computing and trust-based self-organized hierarchical energy balance routing protocol (TSHEB) in wireless sensor networks
Nowadays, network lifetime is an important factor in the wireless sensor network, and it produces due to a large amount of data communication between the nodes and less battery storage. To avoid this issue, a new paradigm called trust-based self-...
Analysis for Location-Based Key Pre-distribution in Wireless Sensor Networks
ICIC '09: Proceedings of the 2009 Second International Conference on Information and Computing Science - Volume 02Wireless sensor networks play key roles in many applications. They are often deployed in hostile environment where communications between sensor nodes must be encrypted. This requires the establishment of secure keys between the sensor nodes in the ...
Comments