Skip to main content

A Framework of Deployment Strategy for Hierarchical WSN Security Management

  • Conference paper
Data Privacy Management and Autonomous Spontaneus Security (DPM 2011, SETOP 2011)

Abstract

The heterogeneity and relatively limited resources of the nodes deployed in hierarchical wireless sensor network (WSN) impose a new strategy to guarantee security and confidentiality. A deployment strategy is proposed and focuses on two different levels: complexity of the scheme and security requirement for the application. Three different cryptography mechanisms may be concurrently used in the same framework: PKI distribution, identity-based encryption and symmetric cryptography. As each mechanism has its advantages and disadvantages, criteria are proposed to associate each node with the most relevant security mechanism according to its capability and environment.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. ITU Internet Reports 2005: The Internet of Things, International Telecommunications Union

    Google Scholar 

  2. SmartSantander Project, http://www.smartsantander.eu

  3. Diffie, W., Hellmann, M.E.: New directions in cryptography. IEEE Transactions on Information Theory IT-22, 644–654 (1976)

    Article  Google Scholar 

  4. El Gamal, T.: A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 10–18. Springer, Heidelberg (1985)

    Chapter  Google Scholar 

  5. Boyle, D., Newe, T.: Securing Wireless Sensor Networks: Security Architectures. Journals of Networks 3(1) (January 2008)

    Google Scholar 

  6. Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.D.: SPINS: Security Protocols for Sensor Networks. In: Proceedings of Seventh Annual International Conference on Mobile Computing and Networks, MOBICOM 2001 (July 2001)

    Google Scholar 

  7. Heo, J., Hong, C.S.: Efficient and Authenticated Key Agreement Mechanism in Low-Rate WPAN Environment. In: 1st International Symposium on Wireless Pervasive Computing, pp. 1–5 (2006)

    Google Scholar 

  8. Zhu, S., Setia, S., Jajodia, S.: LEAP+: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks. In: Proceedings of the 10th ACM Conference on Computer and Communication Security, CCS 2003, New York, USA (2003)

    Google Scholar 

  9. Stenberg, E.M.: Distributing a Private Key Generator in Ad-hoc Networks. Thesis Report, Tromsø University (May 2009)

    Google Scholar 

  10. Zhou, L., Haas, Z.J.: Securing ad hoc networks. IEEE Network Magazine 13(6), 24–30 (1999)

    Article  Google Scholar 

  11. Perrig, A., Canetti, R., Tygar, J.D., Song, D.: The TESLA Broadcast Authentication Protocol. CryptoBytes 5(2), 2–13 (2002)

    Google Scholar 

  12. Liu, D., Ning, P.: Multi-Level μTESLA: Broadcast Authentication for Distributed Sensor Networks. ACM Transactions on Embedded Computing Systems (TECS) 3(4) (November 2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Hennebert, C., Berg, V. (2012). A Framework of Deployment Strategy for Hierarchical WSN Security Management. In: Garcia-Alfaro, J., Navarro-Arribas, G., Cuppens-Boulahia, N., de Capitani di Vimercati, S. (eds) Data Privacy Management and Autonomous Spontaneus Security. DPM SETOP 2011 2011. Lecture Notes in Computer Science, vol 7122. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-28879-1_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-28879-1_22

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-28878-4

  • Online ISBN: 978-3-642-28879-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics