• DocumentCode
    3633422
  • Title

    Setting up secure wireless sensor networks

  • Author

    Victor Cionca;Thomas Newe;Vasile Dadarlat

  • Author_Institution
    Electronic and Computer Engineering, University of Limerick, Ireland
  • fYear
    2009
  • Firstpage
    335
  • Lastpage
    338
  • Abstract
    The current state for security research in sensor networks presents many approaches for all possible security services. Upon network deployment protocols must be selected and made to work together so that they meet application requirements like security level, dynamics or power consumption. This is a non-trivial process and requires an expert in both security and networks, and can definitely not be performed by a user. This paper identifies a set of application-space parameters which controls security requirements. A method of selecting security protocols based on those parameters is presented; it allows non-expert users to configure the security without any knowledge of networks, protocols or security. It also allows the automation of the security configuration process.
  • Keywords
    "Wireless sensor networks","Protocols","Data security","Hardware","Military computing","Information security","Computer networks","Computer security","Energy consumption","Biosensors"
  • Publisher
    ieee
  • Conference_Titel
    Intelligent Computer Communication and Processing, 2009. ICCP 2009. IEEE 5th International Conference on
  • Print_ISBN
    978-1-4244-5007-7
  • Type

    conf

  • DOI
    10.1109/ICCP.2009.5284740
  • Filename
    5284740