Denial of Service in Sensor Networks
Computer
A pairwise key pre-distribution scheme for wireless sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
The sybil attack in sensor networks: analysis & defenses
Proceedings of the 3rd international symposium on Information processing in sensor networks
TinySec: a link layer security architecture for wireless sensor networks
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
EESR '05 Proceedings of the 2005 workshop on End-to-end, sense-and-respond systems, applications and services
Security Patterns: Integrating Security and Systems Engineering
Security Patterns: Integrating Security and Systems Engineering
Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
An application-driven perspective on wireless sensor network security
Proceedings of the 2nd ACM international workshop on Quality of service & security for wireless and mobile networks
MiniSec: a secure sensor network communication architecture
Proceedings of the 6th international conference on Information processing in sensor networks
PERCOM '07 Proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications
Using Security Patterns to Combine Security Metrics
ARES '08 Proceedings of the 2008 Third International Conference on Availability, Reliability and Security
Steel, cast iron and concrete: security engineering for real world wireless sensor networks
ACNS'08 Proceedings of the 6th international conference on Applied cryptography and network security
Tampering with motes: real-world physical attacks on wireless sensor networks
SPC'06 Proceedings of the Third international conference on Security in Pervasive Computing
Configuration Tool for a Wireless Sensor Network Integrated Security Framework
Journal of Network and Systems Management
Security evaluation methodology for intrusion recovery protocols in wireless sensor networks
Proceedings of the 15th ACM international conference on Modeling, analysis and simulation of wireless and mobile systems
Hi-index | 0.00 |
Providing usable security mechanisms for Wireless Sensor Networks (WSNs) is one of the important tasks to foster WSN development, as they will increasingly be deployed in real-world settings in the future. Generally, due to its complexity, expert knowledge in the field of security is needed to plan, implement, and deploy a sound security setup. Frequently, no or only basic security mechanisms leave the WSN open to attacks of which the application designer might not be aware, especially if no security evaluation has been done. Furthermore, available security mechanisms have a great impact on the design of the application itself, i.e. to properly secure a protocol. We therefore propose a framework that first devises feasible security setups based on the characteristics of the envisioned application and second provides a security evaluation of theses possibilities from which the application designer is able to choose the fitting setup for his application. We have prototypically implemented the proposed scheme into the WSN middleware synthesis tool FABRIC and thus support the application designer in including a sound security solution into his application.