• DocumentCode
    2728181
  • Title

    Wireless sensor network: Security challenges

  • Author

    Blilat, Asmae ; Bouayad, Anas ; el houda Chaoui, Nour ; Ghazi, M.E.

  • Author_Institution
    LTTI Lab., Sidi Mohamed Ben Abdellah Univ., Fez, Morocco
  • fYear
    2012
  • fDate
    20-21 April 2012
  • Firstpage
    68
  • Lastpage
    72
  • Abstract
    With the advent of low-power wireless sensor networks, a wealth of new applications at the interface of the real and digital worlds is emerging. A distributed computing platform that can measure properties of the real world, formulate intelligent inferences, and instrument responses, requires strong foundations in distributed computing, artificial intelligence, databases, control theory, and security. Before these intelligent systems can be deployed in critical infrastructures such as emergency rooms and powerplants, the security properties of sensors must be fully understood. Existing wisdom has been to apply the traditional security models and techniques to sensor networks. However, sensor networks are not traditional computing devices, and as a result, existing security models and methods are ill suited. In this position paper, we take the first steps towards producing a comprehensive security model that is tailored for sensor networks. Incorporating work from Internet security, ubiquitous computing, and distributed systems, we outline security properties that must be considered when designing a secure sensor network. We propose challenges for sensor networks - security obstacles that, when overcome, will move us closer to decreasing the divide between computers and the physical world.
  • Keywords
    Internet; telecommunication security; ubiquitous computing; wireless sensor networks; Internet security; artificial intelligence; control theory; critical infrastructure; database; distributed computing platform; distributed system; emergency room; instrument response; intelligent inference; intelligent system; powerplant; ubiquitous computing; wireless sensor network security; Computational modeling; Cryptography; Intelligent sensors; Routing; Sensor phenomena and characterization; formatting; intelligent systems; security; sensor networks;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Network Security and Systems (JNS2), 2012 National Days of
  • Conference_Location
    Marrakech
  • Print_ISBN
    978-1-4673-1050-5
  • Electronic_ISBN
    978-1-4673-1052-9
  • Type

    conf

  • DOI
    10.1109/JNS2.2012.6249244
  • Filename
    6249244