Michael Riecker, Rainer Thome, Dingwen Yuan, M. Hollick
{"title":"A secure monitoring and control system for Wireless Sensor Networks","authors":"Michael Riecker, Rainer Thome, Dingwen Yuan, M. Hollick","doi":"10.1109/LCN.2012.6423597","DOIUrl":null,"url":null,"abstract":"The maintenance of Wireless Sensor Networks (WSNs) can carry high or prohibitive costs, particularly, if the WSN is deployed in unattended areas. Secure monitoring and control of the WSN is vital, however, practical systems are rare and limited with respect to their capabilities. We present a monitoring and control system for WSNs that is secure and additionally equipped with intrusion detection functionality. It allows to reliably assess the actual status of the network, to configure the sensor nodes, and to further use this data to highlight suspicious events.","PeriodicalId":209071,"journal":{"name":"37th Annual IEEE Conference on Local Computer Networks","volume":"128 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"37th Annual IEEE Conference on Local Computer Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/LCN.2012.6423597","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
The maintenance of Wireless Sensor Networks (WSNs) can carry high or prohibitive costs, particularly, if the WSN is deployed in unattended areas. Secure monitoring and control of the WSN is vital, however, practical systems are rare and limited with respect to their capabilities. We present a monitoring and control system for WSNs that is secure and additionally equipped with intrusion detection functionality. It allows to reliably assess the actual status of the network, to configure the sensor nodes, and to further use this data to highlight suspicious events.