Memory storage administration of security encryption keys for line topology in maritime wireless sensor networks

Walid Elgenaidi, T. Newe, E. O’Connell, D. Toal, G. Dooly, Joseph Coleman
{"title":"Memory storage administration of security encryption keys for line topology in maritime wireless sensor networks","authors":"Walid Elgenaidi, T. Newe, E. O’Connell, D. Toal, G. Dooly, Joseph Coleman","doi":"10.1109/ICSENST.2016.7796268","DOIUrl":null,"url":null,"abstract":"Handling the security in Wireless Sensor Networks (WSNs) requires cryptographic mechanisms to detect faulty and unstable nodes that lead to the inactivity of network during packet travelling. Although, cryptographic security mechanism operations demand a high calculation of computational time and memory resources, while the sensor nodes have low memory and low computation capability. Alternatively, trust management schemes are tools to address some main issues in WSNs including memory and storage space, key generation, and re-keying. In this work, we will present solution of memory resources consumption and key management processing issues for a secure maritime coastal monitoring system. This system is a symmetric security scheme with a dynamic update key based on a trusted node configuration, called a leader node, which works as a trusted third party.","PeriodicalId":297617,"journal":{"name":"2016 10th International Conference on Sensing Technology (ICST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 10th International Conference on Sensing Technology (ICST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSENST.2016.7796268","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 9

Abstract

Handling the security in Wireless Sensor Networks (WSNs) requires cryptographic mechanisms to detect faulty and unstable nodes that lead to the inactivity of network during packet travelling. Although, cryptographic security mechanism operations demand a high calculation of computational time and memory resources, while the sensor nodes have low memory and low computation capability. Alternatively, trust management schemes are tools to address some main issues in WSNs including memory and storage space, key generation, and re-keying. In this work, we will present solution of memory resources consumption and key management processing issues for a secure maritime coastal monitoring system. This system is a symmetric security scheme with a dynamic update key based on a trusted node configuration, called a leader node, which works as a trusted third party.
海上无线传感器网络线路拓扑安全加密密钥的存储器存储管理
在无线传感器网络(WSNs)中,为了保证网络的安全,需要采用加密机制来检测故障节点和不稳定节点,这些节点会导致网络在数据包传输过程中处于不活跃状态。然而,加密安全机制的运行需要大量的计算时间和内存资源,而传感器节点的内存和计算能力都很低。另外,信任管理方案是解决wsn中一些主要问题的工具,包括内存和存储空间、密钥生成和密钥重设。在这项工作中,我们将提出一个安全的海上海岸监测系统的内存资源消耗和密钥管理处理问题的解决方案。该系统是一种对称的安全方案,具有基于可信节点配置的动态更新密钥,称为领导节点,作为可信第三方。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信