Selection application for platforms and security protocols suitable for wireless sensor networks

被引:0
|
作者
Moeller, S. [1 ]
Newe, T. [1 ]
Lochmann, S.
机构
[1] Univ Limerick, Limerick, Ireland
来源
关键词
D O I
10.1088/1742-6596/178/1/012034
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
There is a great number of platforms and security protocols which can be used for wireless sensor networks (WSN). All these platforms and protocols have different properties with certain advantages and disadvantages. For a good choice of platform and an associated protocol, these advantages and disadvantages should be compared and the best for the appropriate WSN chosen. To select a Security protocol and a wireless platform suitable for a specific application a software tool will be developed. That tool will enable wireless network deployment engineers to easily select a suitable wireless platform for their application based on their network needs and application security requirements.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Review of Platforms and Security Protocols suitable for Wireless Sensor Networks
    Moeller, S.
    Newe, T.
    Lochmann, S.
    2009 IEEE SENSORS, VOLS 1-3, 2009, : 1001 - +
  • [2] Security Protocols for Wireless Sensor Networks
    Bhalla, Monika
    Pandey, Nitin
    Kumar, Brijesh
    2015 INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND INTERNET OF THINGS (ICGCIOT), 2015, : 1005 - 1009
  • [3] Security protocols in wireless tactical sensor networks
    Vergados, Dimitrios D.
    Stergiou, Giannis
    MILCOM 2005 - 2005 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-5, 2005, : 1463 - 1469
  • [5] Security in Wireless Sensor Networks: A formal verification of protocols
    Nandi, Giann Spilere
    Pereira, David
    Vigil, Martin
    Moraes, Ricardo
    Morales, Analucia Schiaffino
    Araujo, Gustavo
    2019 IEEE 17TH INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS (INDIN), 2019, : 425 - 431
  • [6] Security analysis of routing protocols in wireless sensor networks
    Sadeghi, Mohammad
    Khosravi, Farshad
    Atefi, Kayvan
    Barati, Mehdi
    International Journal of Computer Science Issues, 2012, 9 (1 1-3): : 465 - 472
  • [7] Wireless Sensor Networks: Routing Protocols and Security Issues
    Anjali
    Shikha
    Sharma, Mohit
    2014 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT, 2014,
  • [8] FORMAL ANALYSIS OF SECURITY PROTOCOLS FOR WIRELESS SENSOR NETWORKS
    Novotny, Marian
    CECC '09: 9TH CENTRAL EUROPEAN CONFERENCE ON CRYPTOGRAPHY - TREBIC, 2010, 47 : 81 - 97
  • [9] Formal Security Verification of Transport Protocols for Wireless Sensor Networks
    Vinh-Thong Ta
    Dvir, Amit
    Buttyan, Levente
    ADVANCED COMPUTATIONAL METHODS FOR KNOWLEDGE ENGINEERING, 2014, 282 : 389 - 403
  • [10] Integrated Protocols to Ensure Security Services in Wireless Sensor Networks
    Faisal, Mohammed
    Al-Muhtadi, Jalal
    Al-Dhelaan, Abdullah
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,