Reference Hub5
A Complete Security Framework for Wireless Sensor Networks: Theory and Practice

A Complete Security Framework for Wireless Sensor Networks: Theory and Practice

Christophe Guyeux, Abdallah Makhoul, Ibrahim Atoui, Samar Tawbi, Jacques M. Bahi
Copyright: © 2015 |Volume: 10 |Issue: 1 |Pages: 28
ISSN: 1554-1045|EISSN: 1554-1053|EISBN13: 9781466676237|DOI: 10.4018/ijitwe.2015010103
Cite Article Cite Article

MLA

Guyeux, Christophe, et al. "A Complete Security Framework for Wireless Sensor Networks: Theory and Practice." IJITWE vol.10, no.1 2015: pp.47-74. http://doi.org/10.4018/ijitwe.2015010103

APA

Guyeux, C., Makhoul, A., Atoui, I., Tawbi, S., & Bahi, J. M. (2015). A Complete Security Framework for Wireless Sensor Networks: Theory and Practice. International Journal of Information Technology and Web Engineering (IJITWE), 10(1), 47-74. http://doi.org/10.4018/ijitwe.2015010103

Chicago

Guyeux, Christophe, et al. "A Complete Security Framework for Wireless Sensor Networks: Theory and Practice," International Journal of Information Technology and Web Engineering (IJITWE) 10, no.1: 47-74. http://doi.org/10.4018/ijitwe.2015010103

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Wireless sensor networks are often deployed in public or otherwise untrusted and even hostile environments, which prompt a number of security issues. Although security is a necessity in other types of networks, it is much more so in sensor networks due to the resource-constraint, susceptibility to physical capture, and wireless nature. Till now, most of the security approaches proposed for sensor networks present single solution for particular and single problem. Therefore, to address the special security needs of sensor networks as a whole we introduce a security framework. In their framework, the authors emphasize the following areas: (1) secure communication infrastructure, (2) secure scheduling, and (3) a secure data aggregation algorithm. Due to resource constraints, specific strategies are often necessary to preserve the network's lifetime and its quality of service. For instance, to reduce communication costs, data can be aggregated through the network, or nodes can go to sleep mode periodically (nodes scheduling). These strategies must be proven as secure, but protocols used to guarantee this security must be compatible with the resource preservation requirement. To achieve this goal, secure communications in such networks will be defined, together with the notions of secure scheduling and secure aggregation. The concepts of indistinguability, nonmalleability, and message detection resistance will thus be adapted to communications in wireless sensor networks. Finally, some of these security properties will be evaluated in concrete case studies.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.