TY - GEN
T1 - Security protocols for use with wireless sensor networks a survey of security architectures
AU - Boyle, D.
AU - Newe, T.
PY - 2007
Y1 - 2007
N2 - Wireless sensor networking continues to evolve as one of the most exciting and challenging research areas of our time. Intrinsically, there are many applications of wireless sensor networks that collect and disseminate sensitive and important information. In order for many implementations of these applications to operate successfully, it is necessary to maintain the privacy and security of the transmitted data. What remains undefined, however, is an agreeable and most effective way of securing the information. This paper considers popular and progressive security architectures available and used to-date, whilst focusing on authentication. Authentication can be defined as a security mechanism, the use of which allows the identity of a node in the network to be identified as a valid node of the network. Data authenticity can be achieved when a valid node decrypts the appended message authentication code, or applies one to an outgoing packet, using some known/shared key. Node authentication can be achieved using a number of different methods. A comparison table is presented which illustrates the various properties held by these security protocols, including authentication characteristics. This will allow the desirable characteristics of the various security architectures to be easily identifiable to designers in their struggle to implement the most cost effective and appropriate method of securing their network.
AB - Wireless sensor networking continues to evolve as one of the most exciting and challenging research areas of our time. Intrinsically, there are many applications of wireless sensor networks that collect and disseminate sensitive and important information. In order for many implementations of these applications to operate successfully, it is necessary to maintain the privacy and security of the transmitted data. What remains undefined, however, is an agreeable and most effective way of securing the information. This paper considers popular and progressive security architectures available and used to-date, whilst focusing on authentication. Authentication can be defined as a security mechanism, the use of which allows the identity of a node in the network to be identified as a valid node of the network. Data authenticity can be achieved when a valid node decrypts the appended message authentication code, or applies one to an outgoing packet, using some known/shared key. Node authentication can be achieved using a number of different methods. A comparison table is presented which illustrates the various properties held by these security protocols, including authentication characteristics. This will allow the desirable characteristics of the various security architectures to be easily identifiable to designers in their struggle to implement the most cost effective and appropriate method of securing their network.
KW - Authentication protocols
KW - Security
KW - Wireless sensor networks
UR - http://www.scopus.com/inward/record.url?scp=42749106805&partnerID=8YFLogxK
U2 - 10.1109/ICWMC.2007.80
DO - 10.1109/ICWMC.2007.80
M3 - Conference contribution
AN - SCOPUS:42749106805
SN - 0769527965
SN - 9780769527963
T3 - Third International Conference on Wireless and Mobile Communications 2007, ICWMC '07
BT - Third International Conference on Wireless and Mobile Communications 2007, ICWMC '07
T2 - Third International Conference on Wireless and Mobile Communications 2007, ICWMC '07
Y2 - 4 March 2007 through 9 March 2007
ER -