Next century challenges: mobile networking for “Smart Dust”
MobiCom '99 Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking
SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
Security in Computing
SPINS: security protocols for sensor networks
Wireless Networks
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
A pairwise key pre-distribution scheme for wireless sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Secure sensor networks for perimeter protection
Computer Networks: The International Journal of Computer and Telecommunications Networking - Special issue: Wireless sensor networks
The sybil attack in sensor networks: analysis & defenses
Proceedings of the 3rd international symposium on Information processing in sensor networks
Minimalist security and privacy schemes based on enhanced AES for integrated WISP sensor networks
International Journal of Communication Networks and Distributed Systems
Hi-index | 0.00 |
The adoption and widespread deployment of wireless sensor networks means that security issues are of critical concern. To date, much research has focused on the usability of these networks in a variety of environments where conventional wired networks may not be feasible. However, less emphasis was placed on the security issues of employing a sensor network and its exposure to potential threats. Due to the severe physical constraints in sensor nodes, traditional cryptographic mechanisms are not suitable to deal with such potential security threats. This paper proposes a secure lightweight architecture that takes account of the constraints of sensor networks. With the use of a base station, a hierarchical network topology is formed that enables end-to-end communication between sensor nodes with the aid of intermediary nodes where necessary. The architecture also supports the detection and isolation of aberrant nodes.