A framework of deployment strategy for hierarchical WSN security management

  • Authors:
  • Christine Hennebert;Vincent Berg

  • Affiliations:
  • CEA-Leti, Grenoble, France;CEA-Leti, Grenoble, France

  • Venue:
  • DPM'11 Proceedings of the 6th international conference, and 4th international conference on Data Privacy Management and Autonomous Spontaneus Security
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

The heterogeneity and relatively limited resources of the nodes deployed in hierarchical wireless sensor network (WSN) impose a new strategy to guarantee security and confidentiality. A deployment strategy is proposed and focuses on two different levels: complexity of the scheme and security requirement for the application. Three different cryptography mechanisms may be concurrently used in the same framework: PKI distribution, identity-based encryption and symmetric cryptography. As each mechanism has its advantages and disadvantages, criteria are proposed to associate each node with the most relevant security mechanism according to its capability and environment.