DocumentCode
2115198
Title
Security Protocols for Use with Wireless Sensor Networks: A Survey of Security Architectures
Author
Boyle, D. ; Newe, T.
Author_Institution
Univ. of Limerick, Limerick
fYear
2007
fDate
4-9 March 2007
Firstpage
54
Lastpage
54
Abstract
Wireless sensor networking continues to evolve as one of the most exciting and challenging research areas of our time. Intrinsically, there are many applications of wireless sensor networks that collect and disseminate sensitive and important information. In order for many implementations of these applications to operate successfully, it is necessary to maintain the privacy and security of the transmitted data. What remains undefined, however, is an agreeable and most effective way of securing the information. This paper considers popular and progressive security architectures available and used to-date, whilst focusing on authentication. Authentication can be defined as a security mechanism, the use of which allows the identity of a node in the network to be identified as a valid node of the network. Data authenticity can be achieved when a valid node decrypts the appended message authentication code, or applies one to an outgoing packet, using some known/shared key. Node authentication can be achieved using a number of different methods. A comparison table is presented which illustrates the various properties held by these security protocols, including authentication characteristics. This will allow the desirable characteristics of the various security architectures to be easily identifiable to designers in their struggle to implement the most cost effective and appropriate method of securing their network.
Keywords
cryptographic protocols; data privacy; message authentication; telecommunication security; wireless sensor networks; data privacy; message authentication code; node decryption; security protocol; wireless sensor network; Authentication; Communication system security; Computer security; Cryptographic protocols; Cryptography; Data security; Information security; Sensor phenomena and characterization; Wireless application protocol; Wireless sensor networks; authentication protocols; security; wireless sensor networks;
fLanguage
English
Publisher
ieee
Conference_Titel
Wireless and Mobile Communications, 2007. ICWMC '07. Third International Conference on
Conference_Location
Guadeloupe
Print_ISBN
0-7695-2796-5
Electronic_ISBN
0-7695-2796-5
Type
conf
DOI
10.1109/ICWMC.2007.80
Filename
4138160
Link To Document