Designing Secure Protocols for Wireless Sensor Networks

  • Authors:
  • A. Selcuk Uluagac;Christopher P. Lee;Raheem A. Beyah;John A. Copeland

  • Affiliations:
  • Communications Systems Center, School of Electrical and Computer Engineering, Georgia Institute of Tehnology, Atlanta, Georgia, USA 30332;Communications Systems Center, School of Electrical and Computer Engineering, Georgia Institute of Tehnology, Atlanta, Georgia, USA 30332;Communications Assurance and Performance Group, Georgia State University, Georgia, USA 30303;Communications Systems Center, School of Electrical and Computer Engineering, Georgia Institute of Tehnology, Atlanta, Georgia, USA 30332

  • Venue:
  • WASA '08 Proceedings of the Third International Conference on Wireless Algorithms, Systems, and Applications
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

Over the years, a myriad of protocols have been proposed for resource-limited Wireless Sensor Networks (WSNs). Similarly, security research for WSNs has also evolved over the years. Although fundamental notions of WSN research are well established, optimization of the limited resources has motivated new research directions in the field. In this paper, we seek to present general principles to aid in the design of secure WSN protocols. Therefore, building upon both the established and the new concepts, envisioned applications, and the experience garnered from the WSNs research, we first review the desired security services (i.e., confidentiality, authentication, integrity, access control, availability, and nonrepudiation) from WSNs perspective. Then, we question which services would be necessary for resource-constrained WSNs and when it would be most reasonable to implement them for a WSN application.