Setting up secure wireless sensor networks

Victor Cionca, Thomas Newe, Vasile Dǎdârlat

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

The current state for security research in sensor networks presents many approaches for all possible security services. Upon network deployment protocols must be selected and made to work together so that they meet application requirements like security level, dynamics or power consumption. This is a non-trivial process and requires an expert in both security and networks, and can definitely not be performed by a user. This paper identifies a set of application-space parameters which controls security requirements. A method of selecting security protocols based on those parameters is presented; it allows non-expert users to configure the security without any knowledge of networks, protocols or security. It also allows the automation of the security configuration process.

Original languageEnglish
Title of host publicationProceedings - 2009 IEEE 5th International Conference on Intelligent Computer Communication and Processing, ICCP 2009
Pages335-338
Number of pages4
DOIs
Publication statusPublished - 2009
Event2009 IEEE 5th International Conference on Intelligent Computer Communication and Processing, ICCP 2009 - Cluj-Napoca, Romania
Duration: 27 Aug 200929 Aug 2009

Publication series

NameProceedings - 2009 IEEE 5th International Conference on Intelligent Computer Communication and Processing, ICCP 2009

Conference

Conference2009 IEEE 5th International Conference on Intelligent Computer Communication and Processing, ICCP 2009
Country/TerritoryRomania
CityCluj-Napoca
Period27/08/0929/08/09

Keywords

  • Configuration
  • Parameters
  • Security
  • Wireless sensor networks

Fingerprint

Dive into the research topics of 'Setting up secure wireless sensor networks'. Together they form a unique fingerprint.

Cite this