Identifying and Isolating Aberrant Nodes in Wireless Sensor Networks

Michael Collins, Simon Dobson, Paddy Nixon

Research output: Contribution to conference (non-published works)Paper

Abstract

Wireless sensor networks consist of many tiny nodes operating in a variety of environments. These nodes are small, inexpensive devices that have constraints in coverage, bandwidth, storage resources, communications ability and processing power. Therefore, traditional, valid cryptographic algorithms such as asymmetric key encryption are not suitable to operate on such networks where security requirements are of crucial importance. This raises serious concerns on finding methods to protect the sensor nodes from adversaries and to quickly segregate those that have been attacked. To address the security vulnerabilities of sensor nodes in a sensor network, this paper proposes a lightweight security protocol to identify and isolate aberrant sensor nodes in a wireless sensor network.
Original languageEnglish
Pages1-7
Number of pages7
Publication statusPublished - 2008
Externally publishedYes
Event3rd International Conference for Internet Technologies and Secured Transactions (ICITST 2008) - Dublin Institute of Technology, Dublin, Ireland
Duration: 23 Jun 200828 Jun 2008

Conference

Conference3rd International Conference for Internet Technologies and Secured Transactions (ICITST 2008)
Abbreviated titleICITST 2008
CountryIreland
CityDublin
Period23/06/0828/06/08

Fingerprint Dive into the research topics of 'Identifying and Isolating Aberrant Nodes in Wireless Sensor Networks'. Together they form a unique fingerprint.

Cite this