Reference Hub1
Trusted Integration of Wireless Sensor Networks into Herd Control Monitoring Application

Trusted Integration of Wireless Sensor Networks into Herd Control Monitoring Application

Laurent Gomez, Michel Riveill
Copyright: © 2013 |Volume: 4 |Issue: 4 |Pages: 24
ISSN: 1947-3192|EISSN: 1947-3206|EISBN13: 9781466658936|DOI: 10.4018/ijaeis.2013100101
Cite Article Cite Article

MLA

Gomez, Laurent, and Michel Riveill. "Trusted Integration of Wireless Sensor Networks into Herd Control Monitoring Application." IJAEIS vol.4, no.4 2013: pp.1-24. http://doi.org/10.4018/ijaeis.2013100101

APA

Gomez, L. & Riveill, M. (2013). Trusted Integration of Wireless Sensor Networks into Herd Control Monitoring Application. International Journal of Agricultural and Environmental Information Systems (IJAEIS), 4(4), 1-24. http://doi.org/10.4018/ijaeis.2013100101

Chicago

Gomez, Laurent, and Michel Riveill. "Trusted Integration of Wireless Sensor Networks into Herd Control Monitoring Application," International Journal of Agricultural and Environmental Information Systems (IJAEIS) 4, no.4: 1-24. http://doi.org/10.4018/ijaeis.2013100101

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Integration of trusted information is an important requirement from business application. As business applications adaption relies on sensor data, that information must be trustworthy enough in order to prevent any misuse of sensor data. For example, the use of un-trustworthy information in healthcare system can have severe consequence on patient life. But it appears that sensors are not tamper resistant enough in order to prevent any capture of cryptographic material stored on the nodes. Therefore, a soft security alternative of hardening security mechanisms is to ensure trustworthiness of sensor data. From its production on the node to its delivery to the business application, and including its processing and forwarding, the authors propose to assess sensor data along its life-cycle. In this paper, the authors propose a framework for the assessment of sensor data trustworthiness, from the acquisition at the node to their delivery to business applications, including any intermediary routing or processing. The assessment aims at identifying erroneous sensor data caused intentionally or unintentionally. In addition, the authors evaluate their approach with real sensor data acquired in the scope of the WASP project (http://www.wasp-project.org - Wirelessly Accessible Sensor Populations - IST 034963) during a herd control experiment.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.