DocumentCode
3633422
Title
Setting up secure wireless sensor networks
Author
Victor Cionca;Thomas Newe;Vasile Dadarlat
Author_Institution
Electronic and Computer Engineering, University of Limerick, Ireland
fYear
2009
Firstpage
335
Lastpage
338
Abstract
The current state for security research in sensor networks presents many approaches for all possible security services. Upon network deployment protocols must be selected and made to work together so that they meet application requirements like security level, dynamics or power consumption. This is a non-trivial process and requires an expert in both security and networks, and can definitely not be performed by a user. This paper identifies a set of application-space parameters which controls security requirements. A method of selecting security protocols based on those parameters is presented; it allows non-expert users to configure the security without any knowledge of networks, protocols or security. It also allows the automation of the security configuration process.
Keywords
"Wireless sensor networks","Protocols","Data security","Hardware","Military computing","Information security","Computer networks","Computer security","Energy consumption","Biosensors"
Publisher
ieee
Conference_Titel
Intelligent Computer Communication and Processing, 2009. ICCP 2009. IEEE 5th International Conference on
Print_ISBN
978-1-4244-5007-7
Type
conf
DOI
10.1109/ICCP.2009.5284740
Filename
5284740
Link To Document