Wireless sensor networks consist of many tiny nodes operating in a variety of environments. These nodes are small, inexpensive devices that have constraints in coverage, bandwidth, storage resources, communications ability and processing power. Therefore, traditional, valid cryptographic algorithms such as asymmetric key encryption are not suitable to operate on such networks where security requirements are of crucial importance. This raises serious concerns on finding methods to protect the sensor nodes from adversaries and to quickly segregate those that have been attacked. To address the security vulnerabilities of sensor nodes in a sensor network, this paper proposes a lightweight security protocol to identify and isolate aberrant sensor nodes in a wireless sensor network.
|Number of pages||7|
|Publication status||Published - 2008|
|Event||3rd International Conference for Internet Technologies and Secured Transactions (ICITST 2008) - Dublin Institute of Technology, Dublin, Ireland|
Duration: 23 Jun 2008 → 28 Jun 2008
|Conference||3rd International Conference for Internet Technologies and Secured Transactions (ICITST 2008)|
|Abbreviated title||ICITST 2008|
|Period||23/06/08 → 28/06/08|
Collins, M., Dobson, S., & Nixon, P. (2008). Identifying and Isolating Aberrant Nodes in Wireless Sensor Networks. 1-7. Paper presented at 3rd International Conference for Internet Technologies and Secured Transactions (ICITST 2008), Dublin, Ireland.