Abstract
Wireless sensor networks (WSN) have become a
complete solution in making use of low power implementation
and embedded systems. Nevertheless, the many constraints
arising from low communication range, limited computing
power, lack of availability of networking protocol, programming
in the absence of certainty and security lapses in the areas of
confidentiality, integrity and availability (CIA), have so far
reduced the full implementations of WSN. A novel security
technique and its functionality for WSN nodes have been
proposed. A review of past and current research, the possibility
of having a secured network and proposals meant to prevent
denial of service (DOS) and complexity attacks. These schemes if
properly implemented, can provide an energy-efficient
mechanism using pre-allocation and a re-keying of key
management models with a secured routine algorithm
complete solution in making use of low power implementation
and embedded systems. Nevertheless, the many constraints
arising from low communication range, limited computing
power, lack of availability of networking protocol, programming
in the absence of certainty and security lapses in the areas of
confidentiality, integrity and availability (CIA), have so far
reduced the full implementations of WSN. A novel security
technique and its functionality for WSN nodes have been
proposed. A review of past and current research, the possibility
of having a secured network and proposals meant to prevent
denial of service (DOS) and complexity attacks. These schemes if
properly implemented, can provide an energy-efficient
mechanism using pre-allocation and a re-keying of key
management models with a secured routine algorithm
Original language | English |
---|---|
Title of host publication | Proceedings of the 12th Annual PostGraduate Symposium on the convergence of Telecommunications, Networking and Broadcasting |
Editors | Madjid Merabti, Omar Abuelmaatti |
Publisher | Liverpool John Moores University |
Pages | 123-128 |
Number of pages | 6 |
ISBN (Print) | 978-1-902560-25-0 |
Publication status | Published - 2011 |
Keywords
- WSN; Clusterhead; Judy; Blom; IPSEC; DOS