Security fusion: a new security architecture for resource-constrained environments

  • Authors:
  • Suku Nair;Subil Abraham;Omar Al Ibrahim

  • Affiliations:
  • HACNET Labs, Computer Science and Engineering, Southern Methodist University;HACNET Labs, Computer Science and Engineering, Southern Methodist University;HACNET Labs, Computer Science and Engineering, Southern Methodist University

  • Venue:
  • HotSec'11 Proceedings of the 6th USENIX conference on Hot topics in security
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

There is a huge demand for wireless sensors and RFID tags for remote surveillance and tracking. However, in order for such technologies to gain wide acceptance in industry, there needs to be strong security integrated into them. Traditional cryptographic schemes are infeasible due to hardware, computation, and power constraints. To that end, we introduce a new security paradigm, namely security fusion. In this approach, strong security properties are synthesized from weaker point-to-point properties, thereby minimizing the resource requirements at each node without compromising the system-level security. In this paper, we describe the concept of security fusion and give a motivation example using finite state machines.