A Lightweight Secure Architecture for Wireless Sensor Networks

Michael Collins, Simon Dobson, Paddy Nixon

Research output: A Conference proceeding or a Chapter in BookConference contributionpeer-review

3 Citations (Scopus)
34 Downloads (Pure)

Abstract

The adoption and widespread deployment of wireless sensor networks means that security issues are of critical concern. To date, much research has focused on the usability of these networks in a variety of environments where conventional wired networks may not be feasible. However, less emphasis was placed on the security issues of employing a sensor network and its exposure to potential threats. Due to the severe physical constraints in sensor nodes, traditional cryptographic mechanisms are not suitable to deal with such potential security threats. This paper proposes a secure lightweight architecture that takes account of the constraints of sensor networks. With the use of a base station, a hierarchical network topology is formed that enables end-to-end communication between sensor nodes with the aid of intermediary nodes where necessary. The architecture also supports the detection and isolation of aberrant nodes.
Original languageEnglish
Title of host publicationProceedings of the Second International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies
EditorsJaime Lloret Mauri , Narcís Cardona, Kwang-Cheng Chen , Manuela Popescu, Arta Doci
Place of PublicationUnited States
PublisherIEEE, Institute of Electrical and Electronics Engineers
Pages122 - 136
Number of pages15
ISBN (Print)9780769533674
DOIs
Publication statusPublished - 2008
Externally publishedYes
EventUBICOMM 2008: The Second International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies - Valencia, Valencia, Spain
Duration: 29 Sept 20084 Oct 2008

Conference

ConferenceUBICOMM 2008
Abbreviated titleUBICOMM 2008
Country/TerritorySpain
CityValencia
Period29/09/084/10/08

Fingerprint

Dive into the research topics of 'A Lightweight Secure Architecture for Wireless Sensor Networks'. Together they form a unique fingerprint.

Cite this