A Complete Security Framework for Wireless Sensor Networks: Theory and Practice

被引:5
|
作者
Guyeux, Christophe [1 ]
Makhoul, Abdallah [1 ]
Atoui, Ibrahim [2 ]
Tawbi, Samar [2 ]
Bahi, Jacques M. [1 ]
机构
[1] Univ Franche Comte FEMTO ST, Belfort, France
[2] Lebanese Univ, Fac Sci, Hadath, Lebanon
关键词
Cryptography; Data Aggregation; Elliptic Curves; Secure Scheduling; Security; Wireless Sensor Networks;
D O I
10.4018/ijitwe.2015010103
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless sensor networks are often deployed in public or otherwise untrusted and even hostile environments, which prompt a number of security issues. Although security is a necessity in other types of networks, it is much more so in sensor networks due to the resource-constraint, susceptibility to physical capture, and wireless nature. Till now, most of the security approaches proposed for sensor networks present single solution for particular and single problem. Therefore, to address the special security needs of sensor networks as a whole we introduce a security framework. In their framework, the authors emphasize the following areas: (1) secure communication infrastructure, (2) secure scheduling, and (3) a secure data aggregation algorithm. Due to resource constraints, specific strategies are often necessary to preserve the network's lifetime and its quality of service. For instance, to reduce communication costs, data can be aggregated through the network, or nodes can go to sleep mode periodically (nodes scheduling). These strategies must be proven as secure, but protocols used to guarantee this security must be compatible with the resource preservation requirement. To achieve this goal, secure communications in such networks will be defined, together with the notions of secure scheduling and secure aggregation. The concepts of indistinguability, nonmalleability, and message detection resistance will thus be adapted to communications in wireless sensor networks. Finally, some of these security properties will be evaluated in concrete case studies.
引用
收藏
页码:47 / 74
页数:28
相关论文
共 50 条
  • [1] A Security Framework for Wireless Sensor Networks: Theory and Practice
    Guyeux, Christophe
    Makhoul, Abdallah
    Bahi, Jacques M.
    [J]. 2014 IEEE 23RD INTERNATIONAL WETICE CONFERENCE (WETICE), 2014, : 269 - 274
  • [2] Security framework for wireless sensor networks
    Prasad N.R.
    Alam M.
    [J]. Wireless Personal Communications, 2006, 37 (3-4) : 455 - 469
  • [3] A security framework for wireless sensor networks
    Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China
    不详
    不详
    [J]. J. China Univ. Post Telecom., SUPPL. 2 (118-122):
  • [4] A Security Framework for Wireless Sensor Networks
    Stent, Stuart
    [J]. COMMUNICATION AND NETWORKING, 2009, 56 : 444 - 454
  • [5] A Complete Study on the Security Aspects of Wireless Sensor Networks
    Abirami, Sivaprasad
    [J]. INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING AND COMMUNICATIONS, VOL 1, 2019, 55 : 223 - 230
  • [6] A Lightweight Hybrid Security Framework for Wireless Sensor Networks
    Sedjelmaci, Hichem
    Senouci, Sidi Mohammed
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2014, : 3636 - 3641
  • [7] Cross Layer Security Framework for Wireless Sensor Networks
    Sharma, Kalpana
    Ghose, M. K.
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2011, 5 (01): : 39 - 52
  • [8] <bold>A Security Framework for Wireless Sensor Networks</bold>
    Zia, Tanveer
    Zomaya, Albert
    [J]. PROCEEDINGS OF THE 2006 IEEE SENSORS APPLICATIONS SYMPOSIUM, 2006, : 49 - 53
  • [9] DSF - A Distributed Security Framework for Heterogeneous Wireless Sensor Networks
    Saxena, Himali
    Ai, Chunyu
    Valero, Marco
    Li, Yingshu
    Beyah, Raheem
    [J]. MILITARY COMMUNICATIONS CONFERENCE, 2010 (MILCOM 2010), 2010, : 1836 - 1843
  • [10] A Generic Framework For Defining Security Environments Of Wireless Sensor Networks
    Noman, Ali Nur Mohammad
    [J]. PROCEEDINGS OF ICECE 2008, VOLS 1 AND 2, 2008, : 924 - 929