Configuration tool for a wireless sensor network integrated security framework

Victor Cionca, Thomas Newe, Vasile Teodor Dădârlat

Research output: Contribution to journalArticlepeer-review

Abstract

Wireless Sensor Networks (WSNs) will benefit from security frameworks that provide easy to use security while hiding inherent complexity. In comparison to traditional networks, the hardware constraints of wireless sensors demand that network security be configured based on application parameters, in order to provide the desired level of security while efficiently using available resources. Such a security framework is discussed in this paper, with special focus on security configuration, where a configuration methodology is presented in detail. The methodology is implemented as a Java tool with SQLite database backing, and to prove its validity, a sample application is presented and tested. Also, experimental proofs are provided to support the methodology, and the general necessity of configuring security for WSN applications.

Original languageEnglish
Pages (from-to)417-452
Number of pages36
JournalJournal of Network and Systems Management
Volume20
Issue number3
DOIs
Publication statusPublished - Sep 2012

Keywords

  • Security configuration
  • Security framework
  • Wireless sensor networks

Fingerprint

Dive into the research topics of 'Configuration tool for a wireless sensor network integrated security framework'. Together they form a unique fingerprint.

Cite this