Memory storage administration of security encryption keys for line topology in maritime wireless sensor networks

Walid Elgenaidi, Thomas Newe, Eoin O'connell, Daniel Toal, Gerard Dooly, Joseph Coleman

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Handling the security in Wireless Sensor Networks (WSNs) requires cryptographic mechanisms to detect faulty and unstable nodes that lead to the inactivity of network during packet travelling. Although, cryptographic security mechanism operations demand a high calculation of computational time and memory resources, while the sensor nodes have low memory and low computation capability. Alternatively, trust management schemes are tools to address some main issues in WSNs including memory and storage space, key generation, and re-keying. In this work, we will present solution of memory resources consumption and key management processing issues for a secure maritime coastal monitoring system. This system is a symmetric security scheme with a dynamic update key based on a trusted node configuration, called a leader node, which works as a trusted third party.

Original languageEnglish
Title of host publication2016 10th International Conference on Sensing Technology, ICST 2016
PublisherIEEE Computer Society
ISBN (Electronic)9781509007967
DOIs
Publication statusPublished - 22 Dec 2016
Event10th International Conference on Sensing Technology, ICST 2016 - Nanjing, China
Duration: 11 Nov 201613 Nov 2016

Publication series

NameProceedings of the International Conference on Sensing Technology, ICST
ISSN (Print)2156-8065
ISSN (Electronic)2156-8073

Conference

Conference10th International Conference on Sensing Technology, ICST 2016
Country/TerritoryChina
CityNanjing
Period11/11/1613/11/16

Keywords

  • symmetric security scheme
  • Waspmote sensor platform
  • Wireless Sensor Networks
  • WSN

Fingerprint

Dive into the research topics of 'Memory storage administration of security encryption keys for line topology in maritime wireless sensor networks'. Together they form a unique fingerprint.

Cite this