Walid Elgenaidi, T. Newe, E. O’Connell, D. Toal, G. Dooly, Joseph Coleman
{"title":"Memory storage administration of security encryption keys for line topology in maritime wireless sensor networks","authors":"Walid Elgenaidi, T. Newe, E. O’Connell, D. Toal, G. Dooly, Joseph Coleman","doi":"10.1109/ICSENST.2016.7796268","DOIUrl":null,"url":null,"abstract":"Handling the security in Wireless Sensor Networks (WSNs) requires cryptographic mechanisms to detect faulty and unstable nodes that lead to the inactivity of network during packet travelling. Although, cryptographic security mechanism operations demand a high calculation of computational time and memory resources, while the sensor nodes have low memory and low computation capability. Alternatively, trust management schemes are tools to address some main issues in WSNs including memory and storage space, key generation, and re-keying. In this work, we will present solution of memory resources consumption and key management processing issues for a secure maritime coastal monitoring system. This system is a symmetric security scheme with a dynamic update key based on a trusted node configuration, called a leader node, which works as a trusted third party.","PeriodicalId":297617,"journal":{"name":"2016 10th International Conference on Sensing Technology (ICST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 10th International Conference on Sensing Technology (ICST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSENST.2016.7796268","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 9
Abstract
Handling the security in Wireless Sensor Networks (WSNs) requires cryptographic mechanisms to detect faulty and unstable nodes that lead to the inactivity of network during packet travelling. Although, cryptographic security mechanism operations demand a high calculation of computational time and memory resources, while the sensor nodes have low memory and low computation capability. Alternatively, trust management schemes are tools to address some main issues in WSNs including memory and storage space, key generation, and re-keying. In this work, we will present solution of memory resources consumption and key management processing issues for a secure maritime coastal monitoring system. This system is a symmetric security scheme with a dynamic update key based on a trusted node configuration, called a leader node, which works as a trusted third party.