The nesC language: A holistic approach to networked embedded systems
PLDI '03 Proceedings of the ACM SIGPLAN 2003 conference on Programming language design and implementation
LEAP: efficient security mechanisms for large-scale distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Towards Multi-Purpose Wireless Sensor Networks
ICW '05 Proceedings of the 2005 Systems Communications
Malicious Node Detection in Wireless Sensor Networks Using an Autoregression Technique
ICNS '07 Proceedings of the Third International Conference on Networking and Services
Detecting selective forwarding attacks in wireless sensor networks
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
Self-organization in communication networks: principles and design paradigms
IEEE Communications Magazine
Hi-index | 0.00 |
Wireless sensor networks (WSN) are rapidly expanding their attractiveness in both military and civilian applications, imposing the need for effective security strategies/mechanisms. Since sensor networks in many circumstances operate with sensitive data or function in hostile unattended environments, it is essential that these security issues to be addressed in each and every lifecycle phase. In this paper we considered that a new phase (self-destruction) must be included as a final stage in the WSN lifecycle in order to assure the confidentiality regarding information like: network topology, type of measurement data gathered by sensors, encryption/authentication algorithms and key-exchange mechanisms, etc. that can be unveiled otherwise through reverse engineering methods. Moreover, we presented a new procedure that can be followed to implement this new lifecycle phase on a very common and used network topology - mesh.