TY - JOUR
T1 - Trust security mechanism for maritime wireless sensor networks
AU - Walid, Elgenaidi
AU - Thomas, Newe
AU - Eoin, O'Connell
AU - Gerard, Dooly
N1 - Publisher Copyright:
Copyright © 2016 John Wiley & Sons, Ltd.
PY - 2017/12/10
Y1 - 2017/12/10
N2 - To obtain a strong security system based on wireless sensor networks (WSNs), cryptographic-based protocols are desired. Generally, the use of strong security mechanisms demand intensive use of limited resource, particularly memory storage and energy to provide defense services against malicious attacks. Risks detection in WSNs rely upon the behavior of every single sensor node in the system, and in the case of abnormal node behavior, the system protects the travelling packets on the network via a high level of security mechanisms such as a trusted key management algorithm. In this paper, we compare existing schemes and present a new hybrid security scheme suitable for maritime coastal environment–based WSNs. This scheme tackles the issues of memory storage of encryption keys based on a trusted node configuration, called a leader node, which works as a trusted third party for both the node joining and the node revoke processes. This security mechanism is implemented and tested in real time on a Waspmote sensor testbed platform.
AB - To obtain a strong security system based on wireless sensor networks (WSNs), cryptographic-based protocols are desired. Generally, the use of strong security mechanisms demand intensive use of limited resource, particularly memory storage and energy to provide defense services against malicious attacks. Risks detection in WSNs rely upon the behavior of every single sensor node in the system, and in the case of abnormal node behavior, the system protects the travelling packets on the network via a high level of security mechanisms such as a trusted key management algorithm. In this paper, we compare existing schemes and present a new hybrid security scheme suitable for maritime coastal environment–based WSNs. This scheme tackles the issues of memory storage of encryption keys based on a trusted node configuration, called a leader node, which works as a trusted third party for both the node joining and the node revoke processes. This security mechanism is implemented and tested in real time on a Waspmote sensor testbed platform.
KW - hybrid security scheme
KW - maritime coastal monitoring
KW - security mechanism
KW - trust
KW - WSN
UR - http://www.scopus.com/inward/record.url?scp=84987859211&partnerID=8YFLogxK
U2 - 10.1002/cpe.3945
DO - 10.1002/cpe.3945
M3 - Article
AN - SCOPUS:84987859211
SN - 1532-0626
VL - 29
JO - Concurrency and Computation: Practice and Experience
JF - Concurrency and Computation: Practice and Experience
IS - 23
M1 - e3945
ER -