EconPapers    
Economics at your fingertips  
 

A Complete Security Framework for Wireless Sensor Networks: Theory and Practice

Christophe Guyeux, Abdallah Makhoul, Ibrahim Atoui, Samar Tawbi and Jacques M. Bahi
Additional contact information
Christophe Guyeux: University of Franche-Comté (FEMTO-ST), Belfort Cedex, France
Abdallah Makhoul: University of Franche-Comté (FEMTO-ST), Belfort Cedex, France
Ibrahim Atoui: Faculty of Sciences, Lebanese University, Hadath, Lebanon
Samar Tawbi: Faculty of Sciences, Lebanese University, Hadath, Lebanon
Jacques M. Bahi: University of Franche-Comté (FEMTO-ST), Belfort Cedex, France

International Journal of Information Technology and Web Engineering (IJITWE), 2015, vol. 10, issue 1, 47-74

Abstract: Wireless sensor networks are often deployed in public or otherwise untrusted and even hostile environments, which prompt a number of security issues. Although security is a necessity in other types of networks, it is much more so in sensor networks due to the resource-constraint, susceptibility to physical capture, and wireless nature. Till now, most of the security approaches proposed for sensor networks present single solution for particular and single problem. Therefore, to address the special security needs of sensor networks as a whole we introduce a security framework. In their framework, the authors emphasize the following areas: (1) secure communication infrastructure, (2) secure scheduling, and (3) a secure data aggregation algorithm. Due to resource constraints, specific strategies are often necessary to preserve the network's lifetime and its quality of service. For instance, to reduce communication costs, data can be aggregated through the network, or nodes can go to sleep mode periodically (nodes scheduling). These strategies must be proven as secure, but protocols used to guarantee this security must be compatible with the resource preservation requirement. To achieve this goal, secure communications in such networks will be defined, together with the notions of secure scheduling and secure aggregation. The concepts of indistinguability, nonmalleability, and message detection resistance will thus be adapted to communications in wireless sensor networks. Finally, some of these security properties will be evaluated in concrete case studies.

Date: 2015
References: Add references at CitEc
Citations:

Downloads: (external link)
http://services.igi-global.com/resolvedoi/resolve. ... 18/ijitwe.2015010103 (application/pdf)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:igg:jitwe0:v:10:y:2015:i:1:p:47-74

Access Statistics for this article

International Journal of Information Technology and Web Engineering (IJITWE) is currently edited by Ghazi I. Alkhatib

More articles in International Journal of Information Technology and Web Engineering (IJITWE) from IGI Global
Bibliographic data for series maintained by Journal Editor ().

 
Page updated 2025-03-19
Handle: RePEc:igg:jitwe0:v:10:y:2015:i:1:p:47-74