A Complete Security Framework for Wireless Sensor Networks: Theory and Practice
Affiliation auteurs | !!!! Error affiliation !!!! |
Titre | A Complete Security Framework for Wireless Sensor Networks: Theory and Practice |
Type de publication | Journal Article |
Year of Publication | 2015 |
Auteurs | Guyeux C, Makhoul A, Atoui I, Tawbi S, Bahi JM |
Journal | INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGY AND WEB ENGINEERING |
Volume | 10 |
Pagination | 47-74 |
Date Published | JAN-MAR |
Type of Article | Article |
ISSN | 1554-1045 |
Mots-clés | Cryptography, data aggregation, Elliptic Curves, Secure Scheduling, Security, Wireless Sensor Networks |
Résumé | Wireless sensor networks are often deployed in public or otherwise untrusted and even hostile environments, which prompt a number of security issues. Although security is a necessity in other types of networks, it is much more so in sensor networks due to the resource-constraint, susceptibility to physical capture, and wireless nature. Till now, most of the security approaches proposed for sensor networks present single solution for particular and single problem. Therefore, to address the special security needs of sensor networks as a whole we introduce a security framework. In their framework, the authors emphasize the following areas: (1) secure communication infrastructure, (2) secure scheduling, and (3) a secure data aggregation algorithm. Due to resource constraints, specific strategies are often necessary to preserve the network's lifetime and its quality of service. For instance, to reduce communication costs, data can be aggregated through the network, or nodes can go to sleep mode periodically (nodes scheduling). These strategies must be proven as secure, but protocols used to guarantee this security must be compatible with the resource preservation requirement. To achieve this goal, secure communications in such networks will be defined, together with the notions of secure scheduling and secure aggregation. The concepts of indistinguability, nonmalleability, and message detection resistance will thus be adapted to communications in wireless sensor networks. Finally, some of these security properties will be evaluated in concrete case studies. |
DOI | 10.4018/ijitwe.2015010103 |