A group-based security policy for wireless sensor networks

  • Authors:
  • William Claycomb;Rodrigo Lopes;Dongwan Shin;Byunggi Kim

  • Affiliations:
  • New Mexico Tech, Socorro, NM;New Mexico Tech, Socorro, NM;New Mexico Tech, Socorro, NM;Soongsil University, Seoul, South Korea

  • Venue:
  • Proceedings of the 2010 ACM Symposium on Applied Computing
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

The protection of wireless sensor networks is an important task, especially for critical situations such as intrusion detection, tamper monitoring, or military applications. To date, much of the emphasis on protecting sensor networks has focused on key management and secure routing. However, as sensors become more capable and ubiquitous, the need for more fine-grained control over their resources grows. In this paper, we present a security policy for wireless sensor networks which provide designers and administrators the ability to fine-tune access to sensor resources. We build on the notion of group-based key establishment to show how group membership can be utilized in deploying a dynamic, robust, and flexible security policy for wireless sensor networks.