TY - GEN
T1 - The impact of java and public key cryptography in wireless sensor networking
AU - Boyle, David
AU - Newe, Thomas
PY - 2008
Y1 - 2008
N2 - The evolution of Wireless Sensor Networks continues through the arrival of the Java development environment. More intuitive to a wider range of developers, and incorporating more powerful hardware; a number of residual research problems facing designers of Wireless Sensor Networks have been addressed. The objective of this paper is to introduce and provide some exposure to the latest development environment available for Wireless Sensor Networking, illustrate what achievements have already been made, and their immediate impact in the field. In particular, the problem of securing a potential deployment has been one of the major inhibitors to the widespread implementation of sensor networks; a problem which has been thoroughly addressed in the design of the Sun platform. This solution comes in the guise of a fully implemented and operational Public Key Infrastructure. This paper critiques the security services provided; whilst considering current knowledge pertaining to the security of Wireless Sensor Networks, in conjunction with the advantages of such a system and the opportunities it provides.
AB - The evolution of Wireless Sensor Networks continues through the arrival of the Java development environment. More intuitive to a wider range of developers, and incorporating more powerful hardware; a number of residual research problems facing designers of Wireless Sensor Networks have been addressed. The objective of this paper is to introduce and provide some exposure to the latest development environment available for Wireless Sensor Networking, illustrate what achievements have already been made, and their immediate impact in the field. In particular, the problem of securing a potential deployment has been one of the major inhibitors to the widespread implementation of sensor networks; a problem which has been thoroughly addressed in the design of the Sun platform. This solution comes in the guise of a fully implemented and operational Public Key Infrastructure. This paper critiques the security services provided; whilst considering current knowledge pertaining to the security of Wireless Sensor Networks, in conjunction with the advantages of such a system and the opportunities it provides.
UR - http://www.scopus.com/inward/record.url?scp=52049096863&partnerID=8YFLogxK
U2 - 10.1109/ICWMC.2008.64
DO - 10.1109/ICWMC.2008.64
M3 - Conference contribution
AN - SCOPUS:52049096863
SN - 9780769532745
T3 - Proceedings - The 4th International Conference on Wireless and Mobile Communications, ICWMC 2008
SP - 288
EP - 293
BT - Proceedings - The 4th International Conference on Wireless and Mobile Communications, ICWMC 2008
T2 - 4th International Conference on Wireless and Mobile Communications, ICWMC 2008
Y2 - 27 July 2008 through 1 August 2008
ER -