NSPW '97 Proceedings of the 1997 workshop on New security paradigms
Next century challenges: scalable coordination in sensor networks
MobiCom '99 Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking
GPSR: greedy perimeter stateless routing for wireless networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Secure Aggregation for Wireless Networks
SAINT-W '03 Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT'03 Workshops)
TAG: a Tiny AGgregation service for ad-hoc sensor networks
ACM SIGOPS Operating Systems Review - OSDI '02: Proceedings of the 5th symposium on Operating systems design and implementation
A survey of key management for secure group communication
ACM Computing Surveys (CSUR)
SIA: secure information aggregation in sensor networks
Proceedings of the 1st international conference on Embedded networked sensor systems
Proceedings of the 1st international conference on Embedded networked sensor systems
Security in an autonomic computing environment
IBM Systems Journal
Security in autonomic computing
ACM SIGARCH Computer Architecture News - Special issue: Workshop on architectural support for security and anti-virus (WASSA)
Architectures of Increased Availability Wireless Sensor Network Nodes
ITC '04 Proceedings of the International Test Conference on International Test Conference
Trustworthily Forwarding Sensor Networks Information to the Internet
SECUREWARE '07 Proceedings of the The International Conference on Emerging Security Information, Systems, and Technologies
Evaluating confidence in context for context-aware security
AmI'07 Proceedings of the 2007 European conference on Ambient intelligence
SAMAC: A Cross-Layer Communication Protocol for Sensor Networks with Sectored Antennas
IEEE Transactions on Mobile Computing
A Security Adaptation Reference Monitor (SARM) for Highly Dynamic Wireless Environments
SECURWARE '10 Proceedings of the 2010 Fourth International Conference on Emerging Security Information, Systems and Technologies
Sensor network security: a survey
IEEE Communications Surveys & Tutorials
Securing wireless sensor networks: a survey
IEEE Communications Surveys & Tutorials
A lightweight reconfigurable security mechanism for 3G/4G mobile devices
IEEE Wireless Communications
Designing secure sensor networks
IEEE Wireless Communications
Hi-index | 0.00 |
Security in Wireless Sensor Network has become a hot research topic due to their wide deployment and the increasing new runtime attacks they are facing. We observe that traditional security protocols address conventional security problems and cannot deal with dynamic attacks such as sinkhole dynamic behavior. Moreover, they use resources, and limit the efficient use of sensor resources and inevitably the overall network efficiency is not guaranteed. Therefore, the requirements of new security mechanisms must be addressed in a flexible manner. Indeed, there is a lack of generic security adaptation protocols to deal with extremely dynamic security conditions and performances in a context of Wireless Sensor Network where reliability is a critical criterion for many applications. This paper proposes our Security Adaptation Reference Monitor for Wireless Sensor already validated in proximitybased wireless network. It is based on an autonomic computing security looped system, which fine-tunes security means based on the monitoring of the context. Extensive simulations using agent-based approach have been conducted to verify the performance of our system in the case of sensor network in the presence of sinkhole attacks. The results clearly show that we are efficient in terms of survivability, overall network utilization, and power consumption.