The impact of java and public key cryptography in wireless sensor networking

David Boyle, Thomas Newe

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

The evolution of Wireless Sensor Networks continues through the arrival of the Java development environment. More intuitive to a wider range of developers, and incorporating more powerful hardware; a number of residual research problems facing designers of Wireless Sensor Networks have been addressed. The objective of this paper is to introduce and provide some exposure to the latest development environment available for Wireless Sensor Networking, illustrate what achievements have already been made, and their immediate impact in the field. In particular, the problem of securing a potential deployment has been one of the major inhibitors to the widespread implementation of sensor networks; a problem which has been thoroughly addressed in the design of the Sun platform. This solution comes in the guise of a fully implemented and operational Public Key Infrastructure. This paper critiques the security services provided; whilst considering current knowledge pertaining to the security of Wireless Sensor Networks, in conjunction with the advantages of such a system and the opportunities it provides.

Original languageEnglish
Title of host publicationProceedings - The 4th International Conference on Wireless and Mobile Communications, ICWMC 2008
Pages288-293
Number of pages6
DOIs
Publication statusPublished - 2008
Event4th International Conference on Wireless and Mobile Communications, ICWMC 2008 - Athens, Greece
Duration: 27 Jul 20081 Aug 2008

Publication series

NameProceedings - The 4th International Conference on Wireless and Mobile Communications, ICWMC 2008

Conference

Conference4th International Conference on Wireless and Mobile Communications, ICWMC 2008
Country/TerritoryGreece
CityAthens
Period27/07/081/08/08

Fingerprint

Dive into the research topics of 'The impact of java and public key cryptography in wireless sensor networking'. Together they form a unique fingerprint.

Cite this