Title :
Setting up secure wireless sensor networks
Author :
Victor Cionca;Thomas Newe;Vasile Dadarlat
Author_Institution :
Electronic and Computer Engineering, University of Limerick, Ireland
Abstract :
The current state for security research in sensor networks presents many approaches for all possible security services. Upon network deployment protocols must be selected and made to work together so that they meet application requirements like security level, dynamics or power consumption. This is a non-trivial process and requires an expert in both security and networks, and can definitely not be performed by a user. This paper identifies a set of application-space parameters which controls security requirements. A method of selecting security protocols based on those parameters is presented; it allows non-expert users to configure the security without any knowledge of networks, protocols or security. It also allows the automation of the security configuration process.
Keywords :
"Wireless sensor networks","Protocols","Data security","Hardware","Military computing","Information security","Computer networks","Computer security","Energy consumption","Biosensors"
Conference_Titel :
Intelligent Computer Communication and Processing, 2009. ICCP 2009. IEEE 5th International Conference on
Print_ISBN :
978-1-4244-5007-7
DOI :
10.1109/ICCP.2009.5284740