TY - GEN
T1 - Memory storage administration of security encryption keys for line topology in maritime wireless sensor networks
AU - Elgenaidi, Walid
AU - Newe, Thomas
AU - O'connell, Eoin
AU - Toal, Daniel
AU - Dooly, Gerard
AU - Coleman, Joseph
N1 - Publisher Copyright:
© 2016 IEEE.
PY - 2016/12/22
Y1 - 2016/12/22
N2 - Handling the security in Wireless Sensor Networks (WSNs) requires cryptographic mechanisms to detect faulty and unstable nodes that lead to the inactivity of network during packet travelling. Although, cryptographic security mechanism operations demand a high calculation of computational time and memory resources, while the sensor nodes have low memory and low computation capability. Alternatively, trust management schemes are tools to address some main issues in WSNs including memory and storage space, key generation, and re-keying. In this work, we will present solution of memory resources consumption and key management processing issues for a secure maritime coastal monitoring system. This system is a symmetric security scheme with a dynamic update key based on a trusted node configuration, called a leader node, which works as a trusted third party.
AB - Handling the security in Wireless Sensor Networks (WSNs) requires cryptographic mechanisms to detect faulty and unstable nodes that lead to the inactivity of network during packet travelling. Although, cryptographic security mechanism operations demand a high calculation of computational time and memory resources, while the sensor nodes have low memory and low computation capability. Alternatively, trust management schemes are tools to address some main issues in WSNs including memory and storage space, key generation, and re-keying. In this work, we will present solution of memory resources consumption and key management processing issues for a secure maritime coastal monitoring system. This system is a symmetric security scheme with a dynamic update key based on a trusted node configuration, called a leader node, which works as a trusted third party.
KW - symmetric security scheme
KW - Waspmote sensor platform
KW - Wireless Sensor Networks
KW - WSN
UR - http://www.scopus.com/inward/record.url?scp=85010069161&partnerID=8YFLogxK
U2 - 10.1109/ICSensT.2016.7796268
DO - 10.1109/ICSensT.2016.7796268
M3 - Conference contribution
AN - SCOPUS:85010069161
T3 - Proceedings of the International Conference on Sensing Technology, ICST
BT - 2016 10th International Conference on Sensing Technology, ICST 2016
PB - IEEE Computer Society
T2 - 10th International Conference on Sensing Technology, ICST 2016
Y2 - 11 November 2016 through 13 November 2016
ER -