Trust security mechanism for marine wireless sensor networks

Walid Elgenaidi, Thomas Newe

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

To provide a strong security service in Wireless Sensor Networks (WSNs), cryptographic mechanisms are required. Generally these security mechanisms demand intensive use of limited resource, such as memory, and energy to provide a defense against attacks. Monitoring the behavior of nodes and detecting risks according to these behaviors, and then taking decisions based on these measurements generally requires the use of a trusted Key Management scheme. In this paper we compare two existing security key management schemes that were designed for use in mobile ad hoc networks: "An overlay approach to data security in ad-hoc networks" authored by Jorg Liebeherr, Guangyu Dong, and "A hierarchical key management scheme for secure group communications in mobile ad hoc networks" authored by Nen-Chung Wang, Shian-Zhang Fang. Then a Hybrid Security Key Management Mechanism designed for use in the marine environment is proposed. This scheme focuses on reducing the memory storage of keys, using a leader node that is responsible for both the node joining and the node revoke processes. This security mechanism is implementing in real time on the Waspmote sensor platform.

Original languageEnglish
Title of host publicationProceedings of the 2015 Federated Conference on Computer Science and Information Systems, FedCSIS 2015
EditorsMarcin Paprzycki, Leszek Maciaszek, Maria Ganzha, Leszek Maciaszek
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1203-1208
Number of pages6
ISBN (Electronic)9788360810651
DOIs
Publication statusPublished - 2015
EventFederated Conference on Computer Science and Information Systems, FedCSIS 2015 - Lodz, Poland
Duration: 13 Sep 201516 Sep 2015

Publication series

NameProceedings of the 2015 Federated Conference on Computer Science and Information Systems, FedCSIS 2015

Conference

ConferenceFederated Conference on Computer Science and Information Systems, FedCSIS 2015
Country/TerritoryPoland
CityLodz
Period13/09/1516/09/15

Fingerprint

Dive into the research topics of 'Trust security mechanism for marine wireless sensor networks'. Together they form a unique fingerprint.

Cite this