CIA Security Management for Wireless Sensor Network Nodes

Celestine Onyema Iwendi, Alastair Robert Allen

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Wireless sensor networks (WSN) have become a
complete solution in making use of low power implementation
and embedded systems. Nevertheless, the many constraints
arising from low communication range, limited computing
power, lack of availability of networking protocol, programming
in the absence of certainty and security lapses in the areas of
confidentiality, integrity and availability (CIA), have so far
reduced the full implementations of WSN. A novel security
technique and its functionality for WSN nodes have been
proposed. A review of past and current research, the possibility
of having a secured network and proposals meant to prevent
denial of service (DOS) and complexity attacks. These schemes if
properly implemented, can provide an energy-efficient
mechanism using pre-allocation and a re-keying of key
management models with a secured routine algorithm
Original languageEnglish
Title of host publicationProceedings of the 12th Annual PostGraduate Symposium on the convergence of Telecommunications, Networking and Broadcasting
EditorsMadjid Merabti, Omar Abuelmaatti
PublisherLiverpool John Moores University
Pages123-128
Number of pages6
ISBN (Print)978-1-902560-25-0
Publication statusPublished - 2011

Fingerprint

Wireless sensor networks
Availability
DOS
Embedded systems
Network protocols
Communication

Keywords

  • WSN; Clusterhead; Judy; Blom; IPSEC; DOS

Cite this

Iwendi, C. O., & Allen, A. R. (2011). CIA Security Management for Wireless Sensor Network Nodes. In M. Merabti, & O. Abuelmaatti (Eds.), Proceedings of the 12th Annual PostGraduate Symposium on the convergence of Telecommunications, Networking and Broadcasting (pp. 123-128). Liverpool John Moores University.

CIA Security Management for Wireless Sensor Network Nodes. / Iwendi, Celestine Onyema; Allen, Alastair Robert.

Proceedings of the 12th Annual PostGraduate Symposium on the convergence of Telecommunications, Networking and Broadcasting. ed. / Madjid Merabti; Omar Abuelmaatti. Liverpool John Moores University, 2011. p. 123-128.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Iwendi, CO & Allen, AR 2011, CIA Security Management for Wireless Sensor Network Nodes. in M Merabti & O Abuelmaatti (eds), Proceedings of the 12th Annual PostGraduate Symposium on the convergence of Telecommunications, Networking and Broadcasting. Liverpool John Moores University, pp. 123-128.
Iwendi CO, Allen AR. CIA Security Management for Wireless Sensor Network Nodes. In Merabti M, Abuelmaatti O, editors, Proceedings of the 12th Annual PostGraduate Symposium on the convergence of Telecommunications, Networking and Broadcasting. Liverpool John Moores University. 2011. p. 123-128
Iwendi, Celestine Onyema ; Allen, Alastair Robert. / CIA Security Management for Wireless Sensor Network Nodes. Proceedings of the 12th Annual PostGraduate Symposium on the convergence of Telecommunications, Networking and Broadcasting. editor / Madjid Merabti ; Omar Abuelmaatti. Liverpool John Moores University, 2011. pp. 123-128
@inproceedings{705382b7133f47ef9c771ed239345521,
title = "CIA Security Management for Wireless Sensor Network Nodes",
abstract = "Wireless sensor networks (WSN) have become acomplete solution in making use of low power implementationand embedded systems. Nevertheless, the many constraintsarising from low communication range, limited computingpower, lack of availability of networking protocol, programmingin the absence of certainty and security lapses in the areas ofconfidentiality, integrity and availability (CIA), have so farreduced the full implementations of WSN. A novel securitytechnique and its functionality for WSN nodes have beenproposed. A review of past and current research, the possibilityof having a secured network and proposals meant to preventdenial of service (DOS) and complexity attacks. These schemes ifproperly implemented, can provide an energy-efficientmechanism using pre-allocation and a re-keying of keymanagement models with a secured routine algorithm",
keywords = "WSN; Clusterhead; Judy; Blom; IPSEC; DOS",
author = "Iwendi, {Celestine Onyema} and Allen, {Alastair Robert}",
year = "2011",
language = "English",
isbn = "978-1-902560-25-0",
pages = "123--128",
editor = "Madjid Merabti and Omar Abuelmaatti",
booktitle = "Proceedings of the 12th Annual PostGraduate Symposium on the convergence of Telecommunications, Networking and Broadcasting",
publisher = "Liverpool John Moores University",

}

TY - GEN

T1 - CIA Security Management for Wireless Sensor Network Nodes

AU - Iwendi, Celestine Onyema

AU - Allen, Alastair Robert

PY - 2011

Y1 - 2011

N2 - Wireless sensor networks (WSN) have become acomplete solution in making use of low power implementationand embedded systems. Nevertheless, the many constraintsarising from low communication range, limited computingpower, lack of availability of networking protocol, programmingin the absence of certainty and security lapses in the areas ofconfidentiality, integrity and availability (CIA), have so farreduced the full implementations of WSN. A novel securitytechnique and its functionality for WSN nodes have beenproposed. A review of past and current research, the possibilityof having a secured network and proposals meant to preventdenial of service (DOS) and complexity attacks. These schemes ifproperly implemented, can provide an energy-efficientmechanism using pre-allocation and a re-keying of keymanagement models with a secured routine algorithm

AB - Wireless sensor networks (WSN) have become acomplete solution in making use of low power implementationand embedded systems. Nevertheless, the many constraintsarising from low communication range, limited computingpower, lack of availability of networking protocol, programmingin the absence of certainty and security lapses in the areas ofconfidentiality, integrity and availability (CIA), have so farreduced the full implementations of WSN. A novel securitytechnique and its functionality for WSN nodes have beenproposed. A review of past and current research, the possibilityof having a secured network and proposals meant to preventdenial of service (DOS) and complexity attacks. These schemes ifproperly implemented, can provide an energy-efficientmechanism using pre-allocation and a re-keying of keymanagement models with a secured routine algorithm

KW - WSN; Clusterhead; Judy; Blom; IPSEC; DOS

M3 - Conference contribution

SN - 978-1-902560-25-0

SP - 123

EP - 128

BT - Proceedings of the 12th Annual PostGraduate Symposium on the convergence of Telecommunications, Networking and Broadcasting

A2 - Merabti, Madjid

A2 - Abuelmaatti, Omar

PB - Liverpool John Moores University

ER -