Selection application for platforms and security protocols suitable for wireless sensor networks

被引:0
|
作者
Moeller, S. [1 ]
Newe, T. [1 ]
Lochmann, S.
机构
[1] Univ Limerick, Limerick, Ireland
来源
关键词
D O I
10.1088/1742-6596/178/1/012034
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
There is a great number of platforms and security protocols which can be used for wireless sensor networks (WSN). All these platforms and protocols have different properties with certain advantages and disadvantages. For a good choice of platform and an associated protocol, these advantages and disadvantages should be compared and the best for the appropriate WSN chosen. To select a Security protocol and a wireless platform suitable for a specific application a software tool will be developed. That tool will enable wireless network deployment engineers to easily select a suitable wireless platform for their application based on their network needs and application security requirements.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] Ethernet Information Security Protocols Based on Industrial Control Wireless Sensor Networks
    Yin, Xiaobo
    Zhang, Shunxiang
    Feng, Li
    Xu, Guangyu
    JOURNAL OF SENSORS, 2023, 2023
  • [22] Energy Efficient Security Protocols for Wireless Sensor Networks : SPINS vs TinySec
    Mbarek, Bacem
    Meddeb, Aref
    2016 INTERNATIONAL SYMPOSIUM ON NETWORKS, COMPUTERS AND COMMUNICATIONS (ISNCC), 2016,
  • [23] The platforms enabling wireless sensor networks
    Hill, J
    Horton, M
    Kling, R
    Krishnamurthy, L
    COMMUNICATIONS OF THE ACM, 2004, 47 (06) : 41 - 46
  • [24] SPINS: Security Protocols for Sensor Networks
    Adrian Perrig
    Robert Szewczyk
    J.D. Tygar
    Victor Wen
    David E. Culler
    Wireless Networks, 2002, 8 : 521 - 534
  • [25] Application-Oriented Wireless Sensor Network Communication Protocols and Hardware Platforms: a Survey
    Pei, Zhongmin
    Deng, Zhidong
    Yang, Bo
    Cheng, Xiaoliang
    2008 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL TECHNOLOGY, VOLS 1-5, 2008, : 1176 - 1181
  • [26] SPINS: Security protocols for sensor networks
    Perrig, A
    Szewczyk, R
    Tygar, JD
    Wen, V
    Culler, DE
    WIRELESS NETWORKS, 2002, 8 (05) : 521 - 534
  • [27] SPINS: Security Protocols for Sensor Networks
    Ullah, Fasee
    Mehmood, Tahir
    Habib, Masood
    Ibrahim, Muhammad
    PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND COMPUTING (IACSIT ICMLC 2009), 2009, : 333 - 337
  • [28] Addressing protocols for wireless sensor networks
    Du, Zhi-Gao
    Qian, De-Pei
    Liu, Yi
    Ruan Jian Xue Bao/Journal of Software, 2009, 20 (10): : 2787 - 2798
  • [29] MAC protocols for wireless sensor networks
    Pešovic, Uroš
    Peulic, Aleksandar
    Cucej, Zarko
    Elektrotehniski Vestnik/Electrotechnical Review, 2008, 75 (1-2): : 50 - 55
  • [30] MAC protocols for wireless sensor networks
    Pesovic, Uros
    Peulic, Aleksandar
    Cucej, Zarko
    ELEKTROTEHNISKI VESTNIK-ELECTROCHEMICAL REVIEW, 2008, 75 (1-2): : 50 - 55