• DocumentCode
    2115198
  • Title

    Security Protocols for Use with Wireless Sensor Networks: A Survey of Security Architectures

  • Author

    Boyle, D. ; Newe, T.

  • Author_Institution
    Univ. of Limerick, Limerick
  • fYear
    2007
  • fDate
    4-9 March 2007
  • Firstpage
    54
  • Lastpage
    54
  • Abstract
    Wireless sensor networking continues to evolve as one of the most exciting and challenging research areas of our time. Intrinsically, there are many applications of wireless sensor networks that collect and disseminate sensitive and important information. In order for many implementations of these applications to operate successfully, it is necessary to maintain the privacy and security of the transmitted data. What remains undefined, however, is an agreeable and most effective way of securing the information. This paper considers popular and progressive security architectures available and used to-date, whilst focusing on authentication. Authentication can be defined as a security mechanism, the use of which allows the identity of a node in the network to be identified as a valid node of the network. Data authenticity can be achieved when a valid node decrypts the appended message authentication code, or applies one to an outgoing packet, using some known/shared key. Node authentication can be achieved using a number of different methods. A comparison table is presented which illustrates the various properties held by these security protocols, including authentication characteristics. This will allow the desirable characteristics of the various security architectures to be easily identifiable to designers in their struggle to implement the most cost effective and appropriate method of securing their network.
  • Keywords
    cryptographic protocols; data privacy; message authentication; telecommunication security; wireless sensor networks; data privacy; message authentication code; node decryption; security protocol; wireless sensor network; Authentication; Communication system security; Computer security; Cryptographic protocols; Cryptography; Data security; Information security; Sensor phenomena and characterization; Wireless application protocol; Wireless sensor networks; authentication protocols; security; wireless sensor networks;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Wireless and Mobile Communications, 2007. ICWMC '07. Third International Conference on
  • Conference_Location
    Guadeloupe
  • Print_ISBN
    0-7695-2796-5
  • Electronic_ISBN
    0-7695-2796-5
  • Type

    conf

  • DOI
    10.1109/ICWMC.2007.80
  • Filename
    4138160