Abstract
The heterogeneity and relatively limited resources of the nodes deployed in hierarchical wireless sensor network (WSN) impose a new strategy to guarantee security and confidentiality. A deployment strategy is proposed and focuses on two different levels: complexity of the scheme and security requirement for the application. Three different cryptography mechanisms may be concurrently used in the same framework: PKI distribution, identity-based encryption and symmetric cryptography. As each mechanism has its advantages and disadvantages, criteria are proposed to associate each node with the most relevant security mechanism according to its capability and environment.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
ITU Internet Reports 2005: The Internet of Things, International Telecommunications Union
SmartSantander Project, http://www.smartsantander.eu
Diffie, W., Hellmann, M.E.: New directions in cryptography. IEEE Transactions on Information Theory IT-22, 644–654 (1976)
El Gamal, T.: A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 10–18. Springer, Heidelberg (1985)
Boyle, D., Newe, T.: Securing Wireless Sensor Networks: Security Architectures. Journals of Networks 3(1) (January 2008)
Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.D.: SPINS: Security Protocols for Sensor Networks. In: Proceedings of Seventh Annual International Conference on Mobile Computing and Networks, MOBICOM 2001 (July 2001)
Heo, J., Hong, C.S.: Efficient and Authenticated Key Agreement Mechanism in Low-Rate WPAN Environment. In: 1st International Symposium on Wireless Pervasive Computing, pp. 1–5 (2006)
Zhu, S., Setia, S., Jajodia, S.: LEAP+: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks. In: Proceedings of the 10th ACM Conference on Computer and Communication Security, CCS 2003, New York, USA (2003)
Stenberg, E.M.: Distributing a Private Key Generator in Ad-hoc Networks. Thesis Report, Tromsø University (May 2009)
Zhou, L., Haas, Z.J.: Securing ad hoc networks. IEEE Network Magazine 13(6), 24–30 (1999)
Perrig, A., Canetti, R., Tygar, J.D., Song, D.: The TESLA Broadcast Authentication Protocol. CryptoBytes 5(2), 2–13 (2002)
Liu, D., Ning, P.: Multi-Level μTESLA: Broadcast Authentication for Distributed Sensor Networks. ACM Transactions on Embedded Computing Systems (TECS) 3(4) (November 2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Hennebert, C., Berg, V. (2012). A Framework of Deployment Strategy for Hierarchical WSN Security Management. In: Garcia-Alfaro, J., Navarro-Arribas, G., Cuppens-Boulahia, N., de Capitani di Vimercati, S. (eds) Data Privacy Management and Autonomous Spontaneus Security. DPM SETOP 2011 2011. Lecture Notes in Computer Science, vol 7122. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-28879-1_22
Download citation
DOI: https://doi.org/10.1007/978-3-642-28879-1_22
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-28878-4
Online ISBN: 978-3-642-28879-1
eBook Packages: Computer ScienceComputer Science (R0)