CIA Security Management for Wireless Sensor Network Nodes

Celestine Onyema Iwendi, Alastair Robert Allen

Research output: Chapter in Book/Report/Conference proceedingPublished conference contribution

Abstract

Wireless sensor networks (WSN) have become a
complete solution in making use of low power implementation
and embedded systems. Nevertheless, the many constraints
arising from low communication range, limited computing
power, lack of availability of networking protocol, programming
in the absence of certainty and security lapses in the areas of
confidentiality, integrity and availability (CIA), have so far
reduced the full implementations of WSN. A novel security
technique and its functionality for WSN nodes have been
proposed. A review of past and current research, the possibility
of having a secured network and proposals meant to prevent
denial of service (DOS) and complexity attacks. These schemes if
properly implemented, can provide an energy-efficient
mechanism using pre-allocation and a re-keying of key
management models with a secured routine algorithm
Original languageEnglish
Title of host publicationProceedings of the 12th Annual PostGraduate Symposium on the convergence of Telecommunications, Networking and Broadcasting
EditorsMadjid Merabti, Omar Abuelmaatti
PublisherLiverpool John Moores University
Pages123-128
Number of pages6
ISBN (Print)978-1-902560-25-0
Publication statusPublished - 2011

Keywords

  • WSN; Clusterhead; Judy; Blom; IPSEC; DOS

Fingerprint

Dive into the research topics of 'CIA Security Management for Wireless Sensor Network Nodes'. Together they form a unique fingerprint.

Cite this