A security model for Wireless Sensor Networks

被引:0
|
作者
Aliti, A. [1 ]
Sevrani, K. [2 ]
机构
[1] South East European Univ, Tetovo, North Macedonia
[2] Univ Tirana, Tirana, Albania
关键词
wsn security; security framework; security model; authentication; inference;
D O I
10.23919/mipro.2019.8756647
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
State-of-the-art security frameworks have been extensively addressing security issues for web resources, agents and services in the Semantic Web. The provision of Stream Reasoning as a new area spanning Semantic Web and Data Stream Management Systems has eventually opened up new challenges. Namely, their decentralized nature, the metadata descriptions, the number of users, agents, and services, makes securing Stream Reasoning systems difficult to handle. Thus, there is an inherent need of developing new security models which will handle security and automate security mechanism to a more autonomous system that supports complex and dynamic relationships between data, clients and service providers. We plan to validate our proposed security model on a typical application of stream data, on Wireless Sensor Networks (WSNs). In particular, WSNs for water quality monitoring will serve as a case study. The proposed model can be a guide when deploying and maintaining WSNs in different contexts. Moreover, this model will point out main segments which are most important in ensuring security in semantic stream reasoning systems, and their interrelationships. In this paper we propose a security framework to handle most important issues of security within WSN. The security model in itself should be an incentive for other researchers in creating other models to improve information security within semantic stream reasoning systems.
引用
收藏
页码:1165 / 1168
页数:4
相关论文
共 50 条
  • [1] A Security Model for Wireless Sensor Networks
    Marzi, Hosein
    Marzi, Arash
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND VIRTUAL ENVIRONMENTS FOR MEASUREMENT SYSTEMS AND APPLICATIONS (CIVEMSA), 2014, : 64 - 69
  • [2] Realistic Trust Model for Security in Wireless Sensor Networks
    Babu, Shaik Sahil
    Raha, Arnab
    Naskar, Mrinal Kanti
    Alfandi, Omar
    Hogrefe, Dieter
    [J]. JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2012, 7 (04): : 173 - 181
  • [3] Security for Wireless Sensor Networks
    Wang, Yilin
    Qin, Maosheng
    [J]. INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION AND SYSTEMS (ICCAS 2010), 2010, : 844 - 848
  • [4] Security in Wireless Sensor Networks
    Obaidat, Mohammed S.
    Nicopolitidis, Petros
    Li, Jung-Shian
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2009, 2 (02) : 101 - 103
  • [5] Security in wireless sensor networks
    Giruka, Venkata C.
    Singhal, Mukesh
    Royalty, James
    Varanasi, Srilekha
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2008, 8 (01): : 1 - 24
  • [6] On the security of wireless sensor networks
    Roman, R
    Zhou, JY
    Lopez, J
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2005, PT 3, 2005, 3482 : 681 - 690
  • [7] Security in wireless sensor networks
    Du, Xiaojiang
    Chen, Hsiao-Hwa
    [J]. IEEE WIRELESS COMMUNICATIONS, 2008, 15 (04) : 60 - 66
  • [8] Security in wireless sensor networks
    Perrig, A
    Stankovic, J
    Wagner, D
    [J]. COMMUNICATIONS OF THE ACM, 2004, 47 (06) : 53 - 57
  • [9] Security in Wireless Sensor Networks
    Aranzazu Suescun, Catalina
    [J]. SISTEMAS & TELEMATICA, 2009, 7 (13): : 43 - 73
  • [10] Firewalling Wireless Sensor Networks: Security by Wireless
    Martinovic, Ivan
    Gollan, Nicos
    Schmitt, Jens B.
    [J]. 2008 IEEE 33RD CONFERENCE ON LOCAL COMPUTER NETWORKS, VOLS 1 AND 2, 2008, : 753 - 760