SecLooCI: A comprehensive security middleware architecture for shared wireless sensor networks
نویسندگان
چکیده
WSNs are trending towards dynamic environments that enable multiple parties to concurrently deploy and exploit multiple applications on shared nodes. The node owners want to share their nodes’ capabilities in order to increase return on investment, provide value added services, and easily share sensor node services. These concepts drive an evolving view on the software support that is required to service all stakeholders. For example, trust establishment, access control and security policy enforcement must be addressed. The node middleware must be extended to enable such shared usage of nodes while ensuring security. This paper presents the SecLooCI WSN middleware, which enables secure multiparty interactions on top of resource constrained sensor nodes. A prototype implementation for AVR Ravens running the Contiki OS shows the feasibility of the model for this low power micro-controller class of devices. This demonstrates that resource constrained sensor nodes are able to support secure node sharing. 2014 Elsevier B.V. All rights reserved.
منابع مشابه
LPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring
Communication security of wireless sensor networks is achieved using cryptographic keys assigned to the nodes. Due to resource constraints in such networks, random key pre-distribution schemes are of high interest. Although in most of these schemes no location information is considered, there are scenarios that location information can be obtained by nodes after their deployment. In this paper,...
متن کاملIMNTV-Identifying Malicious Nodes using Trust Value in Wireless Sensor Networks
Security is the major area of concern in communication channel. Security is very crucial in wireless sensor networks which are deployed in remote environments. Adversary can disrupt the communication within multi hop sensor networks by launching the attack. The common attacks which disrupt the communication of nodes are packet dropping, packet modification, packet fake routing, badmouthing atta...
متن کاملSecurity Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System
Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...
متن کاملHybrid Key pre-distribution scheme for wireless sensor network based on combinatorial design
Key distribution is an important problem in wireless sensor networks where sensor nodesare randomly scattered in adversarial environments.Due to the random deployment of sensors, a list of keys must be pre-distributed to each sensor node before deployment. To establish a secure communication, two nodes must share common key from their key-rings. Otherwise, they can find a key- path in which ens...
متن کاملToward an energy efficient PKC-based key management system for wireless sensor networks
Due to wireless nature and hostile environment, providing of security is a critical and vital task in wireless sensor networks (WSNs). It is known that key management is an integral part of a secure network. Unfortunately, in most of the previous methods, security is compromised in favor of reducing energy consumption. Consequently, they lack perfect resilience and are not fit for applications ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Ad Hoc Networks
دوره 25 شماره
صفحات -
تاریخ انتشار 2015