CFP last date
20 May 2024
Reseach Article

Security in Heterogeneous Sensor Networks

Published on October 2014 by Supriya K. Narad, Punam R. Kabra
International Conference on Quality Up-gradation in Engineering, Science and Technology
Foundation of Computer Science USA
ICQUEST - Number 1
October 2014
Authors: Supriya K. Narad, Punam R. Kabra
fd82f684-2c06-48c4-bb07-aad2d84e1cf1

Supriya K. Narad, Punam R. Kabra . Security in Heterogeneous Sensor Networks. International Conference on Quality Up-gradation in Engineering, Science and Technology. ICQUEST, 1 (October 2014), 16-18.

@article{
author = { Supriya K. Narad, Punam R. Kabra },
title = { Security in Heterogeneous Sensor Networks },
journal = { International Conference on Quality Up-gradation in Engineering, Science and Technology },
issue_date = { October 2014 },
volume = { ICQUEST },
number = { 1 },
month = { October },
year = { 2014 },
issn = 0975-8887,
pages = { 16-18 },
numpages = 3,
url = { /proceedings/icquest/number1/18686-1522/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Quality Up-gradation in Engineering, Science and Technology
%A Supriya K. Narad
%A Punam R. Kabra
%T Security in Heterogeneous Sensor Networks
%J International Conference on Quality Up-gradation in Engineering, Science and Technology
%@ 0975-8887
%V ICQUEST
%N 1
%P 16-18
%D 2014
%I International Journal of Computer Applications
Abstract

Heterogeneous wireless sensor network consist of sensor nodes with ability, such as different computing power and sensing range. Wireless sensor networks are decentralized and self-organizing in nature and nowadays they are used in several application domains. This distributed system requires security at different levels like physical node level, internodes communication level and application level. This paper is based on security problems related to the data exchange between sensor nodes and propose a hybrid cryptosystem based on Elliptic Curves. The integration issue has been solved by proposing an extension of the SeNsIM integration platform. The solution is to develop a flexible wrapper to connect the whole system to the secured network and carried out an evaluation of the overall system performances.

References
  1. Bowman, M. , Debray, S. K. , and Peterson, L. L. 1993. Reasoning about naming systems. F. Amato, V. Casola, A. Gaglione, A. Mazzeo, A semantic enriched data model for sensor network interoperability, In Simulation Modelling Practice and Theory, 2010, (in Press) Elsevier.
  2. T. Brooke, J. Burrel, and T. Beckwit,Vineyard computing: Sensornetworks in agricultural production, In Pervasive Computing Magazine, pages 3845. IEEE, March 2004.
  3. V. Casola, A. Gaglione, and A. Mazzeo, A reference architecture for sensor networks integration and management, 2009. In IEEE Proceedings of GSN09, Oxford, July 2009.
  4. Certicom Research, Standards for efficient cryptography, SEC 1: Elliptic Curve Cryptography", Version 1. 0, September 20, 2000. Certicom Research. Standards for efficient cryptography.
  5. A. De Benedictis, A. Gaglione and N. Mazzocca, A Secure Architecture for Re-Taskable Sensing Systems, In Journal of Information Assurance and Security, Volume 6 , pp. 240-247, 2011.
  6. Y. Hu D. Li, K. Wong and A. Sayeed, Detection, classification, and tracking in distributed sensor networks, In IEEE Signal Processing Magazine, pages 1729. IEEE, March 2002.
  7. Haodong Wang, Shengbo, Chiu C. Tan and Qun Li, WM-ECC: an Elliptic Curve Cryptography Suite on Sensor Motes, Oct 2007, pp. 3-5
Index Terms

Computer Science
Information Sciences

Keywords

Sensor Networks Sensim-sec Architecture Wmecc Library.