Wireless Sensor Network Nodes

Security and Deployment in the Niger-Delta Oil and Gas Sector

Celestine Onyema Iwendi, Alastair Robert Allen

Research output: Contribution to journalArticle

Abstract

Wireless sensor networks (WSN) is tending towards becoming a complete solution in communication
protocols, embedded systems and low-power implementations. However, the resource constraints which
includes, limited communication range, limited energy, limited computing power, limited bandwidth and
the fear of intruders have limited the WSN applications. Since lightweight computational nodes that are
currently being used in WSN pose particular challenge for many security applications, the whole
research therefore, is the investigation of new security techniques and appropriate implementation for
WSN nodes, including various trade-offs such as implementation complexity, power dissipation, security
flexibility and scalability. The goal of this research is to develop a network that has efficient and flexible
key distribution scheme secured enough to prevent algorithmic complexity and denial of service attacks
as well as the network able to conserve energy. A review of previous research to date in the area of
security for WSNs was carried out and proposals are made based on security schemes that gather data in
an energy-efficient mechanism through secured pre-allocation of keys, faster clustering routing
algorithm and dynamic based rekeying implementation.
Original languageEnglish
Pages (from-to)68–79
Number of pages12
JournalInternational Journal of Network Security & Its Applications
Volume3
Issue number1
DOIs
Publication statusPublished - Jan 2011

Fingerprint

Wireless sensor networks
Gases
Embedded systems
Scalability
Energy dissipation
Bandwidth
Communication
Oils

Cite this

Wireless Sensor Network Nodes : Security and Deployment in the Niger-Delta Oil and Gas Sector. / Iwendi, Celestine Onyema; Allen, Alastair Robert.

In: International Journal of Network Security & Its Applications, Vol. 3, No. 1, 01.2011, p. 68–79.

Research output: Contribution to journalArticle

@article{63b9a4756ac64b66bee031aa77b952db,
title = "Wireless Sensor Network Nodes: Security and Deployment in the Niger-Delta Oil and Gas Sector",
abstract = "Wireless sensor networks (WSN) is tending towards becoming a complete solution in communicationprotocols, embedded systems and low-power implementations. However, the resource constraints whichincludes, limited communication range, limited energy, limited computing power, limited bandwidth andthe fear of intruders have limited the WSN applications. Since lightweight computational nodes that arecurrently being used in WSN pose particular challenge for many security applications, the wholeresearch therefore, is the investigation of new security techniques and appropriate implementation forWSN nodes, including various trade-offs such as implementation complexity, power dissipation, securityflexibility and scalability. The goal of this research is to develop a network that has efficient and flexiblekey distribution scheme secured enough to prevent algorithmic complexity and denial of service attacksas well as the network able to conserve energy. A review of previous research to date in the area ofsecurity for WSNs was carried out and proposals are made based on security schemes that gather data inan energy-efficient mechanism through secured pre-allocation of keys, faster clustering routingalgorithm and dynamic based rekeying implementation.",
author = "Iwendi, {Celestine Onyema} and Allen, {Alastair Robert}",
year = "2011",
month = "1",
doi = "10.5121/ijnsa.2011.3105",
language = "English",
volume = "3",
pages = "68–79",
journal = "International Journal of Network Security & Its Applications",
issn = "0975-2307",
number = "1",

}

TY - JOUR

T1 - Wireless Sensor Network Nodes

T2 - Security and Deployment in the Niger-Delta Oil and Gas Sector

AU - Iwendi, Celestine Onyema

AU - Allen, Alastair Robert

PY - 2011/1

Y1 - 2011/1

N2 - Wireless sensor networks (WSN) is tending towards becoming a complete solution in communicationprotocols, embedded systems and low-power implementations. However, the resource constraints whichincludes, limited communication range, limited energy, limited computing power, limited bandwidth andthe fear of intruders have limited the WSN applications. Since lightweight computational nodes that arecurrently being used in WSN pose particular challenge for many security applications, the wholeresearch therefore, is the investigation of new security techniques and appropriate implementation forWSN nodes, including various trade-offs such as implementation complexity, power dissipation, securityflexibility and scalability. The goal of this research is to develop a network that has efficient and flexiblekey distribution scheme secured enough to prevent algorithmic complexity and denial of service attacksas well as the network able to conserve energy. A review of previous research to date in the area ofsecurity for WSNs was carried out and proposals are made based on security schemes that gather data inan energy-efficient mechanism through secured pre-allocation of keys, faster clustering routingalgorithm and dynamic based rekeying implementation.

AB - Wireless sensor networks (WSN) is tending towards becoming a complete solution in communicationprotocols, embedded systems and low-power implementations. However, the resource constraints whichincludes, limited communication range, limited energy, limited computing power, limited bandwidth andthe fear of intruders have limited the WSN applications. Since lightweight computational nodes that arecurrently being used in WSN pose particular challenge for many security applications, the wholeresearch therefore, is the investigation of new security techniques and appropriate implementation forWSN nodes, including various trade-offs such as implementation complexity, power dissipation, securityflexibility and scalability. The goal of this research is to develop a network that has efficient and flexiblekey distribution scheme secured enough to prevent algorithmic complexity and denial of service attacksas well as the network able to conserve energy. A review of previous research to date in the area ofsecurity for WSNs was carried out and proposals are made based on security schemes that gather data inan energy-efficient mechanism through secured pre-allocation of keys, faster clustering routingalgorithm and dynamic based rekeying implementation.

U2 - 10.5121/ijnsa.2011.3105

DO - 10.5121/ijnsa.2011.3105

M3 - Article

VL - 3

SP - 68

EP - 79

JO - International Journal of Network Security & Its Applications

JF - International Journal of Network Security & Its Applications

SN - 0975-2307

IS - 1

ER -