Security in the integration of low-power Wireless Sensor Networks with the Internet: A survey

被引:68
作者
Granjal, Jorge [1 ]
Monteiro, Edmundo [1 ]
Silva, Jorge Sa [1 ]
机构
[1] Univ Coimbra, Dept Informat Engn, P-3030290 Coimbra, Portugal
关键词
Internet-integrated WSN; 6LoWPAN; RPL; DTLS; CoAP; Internet of Things;
D O I
10.1016/j.adhoc.2014.08.001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The integration of low-power wireless sensing and actuating devices with the Internet will provide an important contribution to the formation of a global communications architecture encompassing Wireless Sensor Networks (WSN), and to enable applications using such devices designed to bring unprecedented convenience and economical benefits to our life. Such applications also take place in the context of our current vision on an Internet of Things (IoT), which promises to encompass heterogeneous devices and communication technologies, including WSN. Due to the characteristics of the devices in WSN and to the requirements of applications, low-power wireless communications are employed and the functionalities supported must be carefully balanced against the limited resources at the disposal of applications. Low-power communication technologies are also currently being designed with the purpose of supporting the integration of WSN with the Internet and, as in isolated WSN environments, security will be a fundamental enabling factor of future applications using Internet-integrated WSN. Although various surveys currently exist addressing security mechanisms for WSN environments, our goal is to analyze how security may be addressed as an enabling factor of the integration of low-power WSN with the Internet, in the context of its contribution to the IoT. We analyze the current research and industry proposals supporting this integration, together with the security solutions and mechanisms designed in its context. Our discussion is supported by an analysis on the attack and threat model against Internet-integrated WSN, and on the security requirements to consider in this context. We believe that a survey with such goals may provide an important contribution to readers interested in embracing this important area of research and ours is, as far as our knowledge goes, the first article with such goals. (C) 2014 Elsevier B.V. All rights reserved.
引用
收藏
页码:264 / 287
页数:24
相关论文
共 106 条
[1]  
Alexander Roger, 2012, SECURITY FRAMEWORK R
[2]  
Amin SO, 2009, ICOIN: 2009 INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING, P285
[3]   The Impact of Rank Attack on Network Topology of Routing Protocol for Low-Power and Lossy Networks [J].
Anhtuan Le ;
Loo, Jonathan ;
Lasebae, Aboubaker ;
Vinel, Alexey ;
Chen, Yue ;
Chai, Michael .
IEEE SENSORS JOURNAL, 2013, 13 (10) :3685-3692
[4]  
[Anonymous], 1981, 793 RFC
[5]  
[Anonymous], 2006, SENSYS06 ACM C EMB N
[6]  
[Anonymous], 2012, document RFC 6551
[7]  
[Anonymous], 2007, P 2007 4 ANN C WIR D
[8]  
[Anonymous], 74982 ISO
[9]  
[Anonymous], AD HOC NETW
[10]  
[Anonymous], 2011, 6LOWPAN WIRELESS EMB