Security Protocols for Use with Wireless Sensor Networks: A Survey of Security Architectures

David Boyle, T. Newe
{"title":"Security Protocols for Use with Wireless Sensor Networks: A Survey of Security Architectures","authors":"David Boyle, T. Newe","doi":"10.1109/ICWMC.2007.80","DOIUrl":null,"url":null,"abstract":"Wireless sensor networking continues to evolve as one of the most exciting and challenging research areas of our time. Intrinsically, there are many applications of wireless sensor networks that collect and disseminate sensitive and important information. In order for many implementations of these applications to operate successfully, it is necessary to maintain the privacy and security of the transmitted data. What remains undefined, however, is an agreeable and most effective way of securing the information. This paper considers popular and progressive security architectures available and used to-date, whilst focusing on authentication. Authentication can be defined as a security mechanism, the use of which allows the identity of a node in the network to be identified as a valid node of the network. Data authenticity can be achieved when a valid node decrypts the appended message authentication code, or applies one to an outgoing packet, using some known/shared key. Node authentication can be achieved using a number of different methods. A comparison table is presented which illustrates the various properties held by these security protocols, including authentication characteristics. This will allow the desirable characteristics of the various security architectures to be easily identifiable to designers in their struggle to implement the most cost effective and appropriate method of securing their network.","PeriodicalId":366935,"journal":{"name":"2007 Third International Conference on Wireless and Mobile Communications (ICWMC'07)","volume":"191 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"61","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2007 Third International Conference on Wireless and Mobile Communications (ICWMC'07)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICWMC.2007.80","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 61

Abstract

Wireless sensor networking continues to evolve as one of the most exciting and challenging research areas of our time. Intrinsically, there are many applications of wireless sensor networks that collect and disseminate sensitive and important information. In order for many implementations of these applications to operate successfully, it is necessary to maintain the privacy and security of the transmitted data. What remains undefined, however, is an agreeable and most effective way of securing the information. This paper considers popular and progressive security architectures available and used to-date, whilst focusing on authentication. Authentication can be defined as a security mechanism, the use of which allows the identity of a node in the network to be identified as a valid node of the network. Data authenticity can be achieved when a valid node decrypts the appended message authentication code, or applies one to an outgoing packet, using some known/shared key. Node authentication can be achieved using a number of different methods. A comparison table is presented which illustrates the various properties held by these security protocols, including authentication characteristics. This will allow the desirable characteristics of the various security architectures to be easily identifiable to designers in their struggle to implement the most cost effective and appropriate method of securing their network.
用于无线传感器网络的安全协议:安全体系结构综述
无线传感器网络继续发展成为我们这个时代最令人兴奋和最具挑战性的研究领域之一。从本质上讲,无线传感器网络有许多用于收集和传播敏感和重要信息的应用。为了使这些应用程序的许多实现能够成功运行,有必要维护传输数据的私密性和安全性。然而,仍未确定的是一种令人满意且最有效的保护信息的方法。本文考虑了流行的和先进的安全体系结构可用和使用的日期,同时侧重于身份验证。身份验证可以定义为一种安全机制,使用它可以将网络中节点的身份识别为网络的有效节点。当有效节点使用某些已知/共享密钥解密附加的消息身份验证码或将其应用于传出数据包时,可以实现数据真实性。可以使用许多不同的方法来实现节点身份验证。给出了一个比较表,说明了这些安全协议所拥有的各种属性,包括身份验证特征。这将使设计人员在努力实现最具成本效益和最适当的网络安全方法时,能够轻松识别各种安全体系结构的理想特征。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信