LHA-SP: Secure protocols for hierarchical wireless sensor networks

被引:23
|
作者
Oliveira, LB [1 ]
Wong, HC [1 ]
Loureiro, AA [1 ]
机构
[1] Univ Fed Minas Gerais, Dept Comp Sci, Belo Horizonte, MG, Brazil
来源
INTEGRATED NETWORK MANAGEMENT IX: MANAGING NEW NETWORKED WORLDS | 2005年
关键词
security management; wireless sensor network security; hierarchical sensor networks;
D O I
10.1109/INM.2005.1440767
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Wireless sensor networks (WSNs) are ad hoc networks comprised mainly of small sensor nodes with limited resources, and can be used to monitor areas of interest. In this paper, we propose a solution for securing heterogeneous hierarchical WSNs with an arbitrary number of levels. Our solution relies exclusively on symmetric key schemes, is highly distributed, and takes into account node interaction patterns that are specific to clustered WSNs.
引用
收藏
页码:31 / 44
页数:14
相关论文
共 24 条
  • [1] Energy-efficient group key management protocols for for hierarchical sensor networks
    Panja, Biswajit
    Madria, Sanjay
    Bhargava, Bharat
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2007, 3 (02): : 201 - 223
  • [2] Secure data aggregation using access control and authentication for wireless sensor networks
    Razaque, Abdul
    Rizvi, Syed S.
    COMPUTERS & SECURITY, 2017, 70 : 532 - 545
  • [3] Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks
    Yang, Yanjiang
    Zhou, Jianying
    Deng, Robert H.
    Bao, Feng
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, 2009, 19 : 285 - +
  • [4] Data relaying with constraints in hierarchical sensor networks
    Robert Benkoczi
    Hossam Hassanein
    Selim Akl
    Sylvia Tai
    Journal of Combinatorial Optimization, 2006, 11 : 113 - 123
  • [5] Data relaying with constraints in hierarchical sensor networks
    Benkoczi, R
    Hassanein, H
    Akl, S
    Tai, S
    JOURNAL OF COMBINATORIAL OPTIMIZATION, 2006, 11 (01) : 113 - 123
  • [6] Security management in Wireless Sensor Networks for healthcare
    Oh, Tae
    Choi, Young B.
    Ryoo, Jungwoo
    Stokes, Kristian
    INTERNATIONAL JOURNAL OF MOBILE COMMUNICATIONS, 2011, 9 (02) : 187 - 207
  • [7] Applied Cryptography for Security and Privacy in Wireless Sensor Networks
    Kar, Dulal C.
    Ngo, Hung L.
    Sanapala, Geetha
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2009, 3 (03) : 14 - 36
  • [8] An asynchronous node replication attack in wireless sensor networks
    Zhou, Jianying
    Das, Tanmoy Kanti
    Lopez, Javier
    PROCEEDINGS OF THE IFIP TC 11/ 23RD INTERNATIONAL INFORMATION SECURITY CONFERENCE, 2008, : 125 - +
  • [9] RUASN: A Robust User Authentication Framework for Wireless Sensor Networks
    Kumar, Pardeep
    Choudhury, Amlan Jyoti
    Sain, Mangal
    Lee, Sang-Gon
    Lee, Hoon-Jae
    SENSORS, 2011, 11 (05) : 5020 - 5046
  • [10] Study on Tradeoffs in Detection of Malicious Data Injections in Wireless Sensor Networks
    Vijayan, Nisha
    Johny, Alphonsa
    1ST GLOBAL COLLOQUIUM ON RECENT ADVANCEMENTS AND EFFECTUAL RESEARCHES IN ENGINEERING, SCIENCE AND TECHNOLOGY - RAEREST 2016, 2016, 25 : 378 - 383