STaR: Security Transparency and Reconfigurability for Wireless Sensor Networks Programming

نویسندگان

  • Roberta Daidone
  • Gianluca Dini
  • Marco Tiloca
چکیده

Wireless Sensor Networks (WSNs) are prone to security attacks. To protect the network from potential adversaries, it is necessary to secure communications between sensor nodes. If we consider a network of heterogeneous objects including WSNs, security requirements may be far more complex. A single application may deal with different traffic flows, each one of which may have different security requirements, that possibly change over time. In this paper, we present STaR, a software component which provides security transparency and reconfigurability for WSNs programming. STaR allows for securing multiple traffic flows at the same time according to specified security policies, and is transparent to the application, i.e. no changes to the original application or the communication protocol are required. STaR can be easily reconfigured at runtime, thus coping with changes of security requirements. Finally, we present our implementation of STaR for Tmote Sky motes, and evaluate it in terms of memory occupancy, communication overhead, and energy consumption.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

STaR: a Reconfigurable and Transparent middleware for WSNs security

Wireless Sensor Networks (WSNs) are prone to security attacks. In order to protect the network from potential adversaries, it is necessary to secure communications between sensor nodes. Also, if we consider a network of heterogeneous objects including WSNs, security requirements may be far more complex. In particular, a single application may deal with multiple different traffic flows, each one...

متن کامل

Security Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System

Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...

متن کامل

Toward an energy efficient PKC-based key management system for wireless sensor networks

Due to wireless nature and hostile environment, providing of security is a critical and vital task in wireless sensor networks (WSNs). It is known that key management is an integral part of a secure network. Unfortunately, in most of the previous methods, security is compromised in favor of reducing energy consumption. Consequently, they lack perfect resilience and are not fit for applications ...

متن کامل

An efficient solution for management of pre-distribution in wireless sensor networks

A sensor node is composed of different parts including processing units, sensor, transmitter, receiver, and security unit. There are many nodes in a sensor unit. These networks can be used for military, industrial, medicine, environmental, house, and many other applications. These nodes may be established in the lands of enemies to monitor the relations. Hence, it is important to consider conse...

متن کامل

An Adaptive LEACH-based Clustering Algorithm for Wireless Sensor Networks

LEACH is the most popular clastering algorithm in Wireless Sensor Networks (WSNs). However, it has two main drawbacks, including random selection of cluster heads, and direct communication of cluster heads with the sink. This paper aims to introduce a new centralized cluster-based routing protocol named LEACH-AEC (LEACH with Adaptive Energy Consumption), which guarantees to generate balanced cl...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013