Securing wireless sensor networks: Security architectures

David Boyle, Thomas Newe

Research output: Contribution to journalArticlepeer-review

Abstract

Wireless sensor networking remains one of the most exciting and challenging research domains of our time. As technology progresses, so do the capabilities of sensor networks. Limited only by what can be technologically sensed, it is envisaged that wireless sensor networks will play an important part in our daily lives in the foreseeable future. Privy to many types of sensitive information, both sensed and disseminated, there is a critical need for security in a number of applications related to this technology. Resulting from the continuous debate over the most effective means of securing wireless sensor networks, this paper considers a number of the security architectures employed, and proposed, to date, with this goal in sight. They are presented such that the various characteristics of each protocol are easily identifiable to potential network designers, allowing a more informed decision to be made when implementing a security protocol for their intended application. Authentication is the primary focus, as the most malicious attacks on a network are the work of imposters, such as DOS attacks, packet insertion etc. Authentication can be defined as a security mechanism, whereby, the identity of a node in the network can be identified as a valid node of the network. Subsequently, data authenticity can be achieved; once the integrity of the message sender/ receiver has been established.

Original languageEnglish
Pages (from-to)65-77
Number of pages13
JournalJournal of Networks
Volume3
Issue number1
DOIs
Publication statusPublished - Jan 2008

Keywords

  • Authentication
  • Cryptography
  • Security
  • Wireless sensor networks

Fingerprint

Dive into the research topics of 'Securing wireless sensor networks: Security architectures'. Together they form a unique fingerprint.

Cite this