A Complete Security Framework for Wireless Sensor Networks: Theory and Practice

Affiliation auteurs!!!! Error affiliation !!!!
TitreA Complete Security Framework for Wireless Sensor Networks: Theory and Practice
Type de publicationJournal Article
Year of Publication2015
AuteursGuyeux C, Makhoul A, Atoui I, Tawbi S, Bahi JM
JournalINTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGY AND WEB ENGINEERING
Volume10
Pagination47-74
Date PublishedJAN-MAR
Type of ArticleArticle
ISSN1554-1045
Mots-clésCryptography, data aggregation, Elliptic Curves, Secure Scheduling, Security, Wireless Sensor Networks
Résumé

Wireless sensor networks are often deployed in public or otherwise untrusted and even hostile environments, which prompt a number of security issues. Although security is a necessity in other types of networks, it is much more so in sensor networks due to the resource-constraint, susceptibility to physical capture, and wireless nature. Till now, most of the security approaches proposed for sensor networks present single solution for particular and single problem. Therefore, to address the special security needs of sensor networks as a whole we introduce a security framework. In their framework, the authors emphasize the following areas: (1) secure communication infrastructure, (2) secure scheduling, and (3) a secure data aggregation algorithm. Due to resource constraints, specific strategies are often necessary to preserve the network's lifetime and its quality of service. For instance, to reduce communication costs, data can be aggregated through the network, or nodes can go to sleep mode periodically (nodes scheduling). These strategies must be proven as secure, but protocols used to guarantee this security must be compatible with the resource preservation requirement. To achieve this goal, secure communications in such networks will be defined, together with the notions of secure scheduling and secure aggregation. The concepts of indistinguability, nonmalleability, and message detection resistance will thus be adapted to communications in wireless sensor networks. Finally, some of these security properties will be evaluated in concrete case studies.

DOI10.4018/ijitwe.2015010103