• English
    • Ελληνικά
    • Deutsch
    • français
    • italiano
    • español
  • français 
    • English
    • Ελληνικά
    • Deutsch
    • français
    • italiano
    • español
  • Ouvrir une session
Voir le document 
  •   Accueil de DSpace
  • Επιστημονικές Δημοσιεύσεις Μελών ΠΘ (ΕΔΠΘ)
  • Δημοσιεύσεις σε περιοδικά, συνέδρια, κεφάλαια βιβλίων κλπ.
  • Voir le document
  •   Accueil de DSpace
  • Επιστημονικές Δημοσιεύσεις Μελών ΠΘ (ΕΔΠΘ)
  • Δημοσιεύσεις σε περιοδικά, συνέδρια, κεφάλαια βιβλίων κλπ.
  • Voir le document
JavaScript is disabled for your browser. Some features of this site may not work without it.
Tout DSpace
  • Communautés & Collections
  • Par date de publication
  • Auteurs
  • Titres
  • Sujets

A framework for secure data delivery in wireless sensor networks

Thumbnail
Auteur
Perlepes, L.; Zaharis, A.; Stamoulis, G.; Kikiras, P.
Date
2012
Sujet
Cryptography
Live forensics
Sand-boxing
Security framework
Wireless sensor networks
Address space
Cost-effective implementations
Destructive effects
Device Driver
Memory protection
Network infrastructure
Physical security
Protection techniques
Resourceconstrained devices
Sandboxing
Secure communications
Secure data
Security frameworks
Security level
Tamper proof
User levels
Energy utilization
Sensor nodes
Afficher la notice complète
Résumé
Typical sensor nodes are resource constrained devices containing user level applications, operating system components, and device drivers in a single address space, with no form of memory protection. A malicious user could easily capture a node and tamper the applications running on it, in order to perform different types of attacks. In this paper, we propose a 3-layer Security Framework composed by physical security schemes, cryptography of communication channels and live forensics protection techniques that allows for secure WSN deployments. Each of the abovementioned techniques maximizes the security levels leading to a tamper proof sensor node. By applying the proposed security framework, secure communication between nodes is guaranteed, identified captured nodes are silenced and their destructive effect on the rest of the network infrastructure is minimized due to the early measures applied. Our main concern is to propose a framework that balances its attributes between robustness, as long as security is concerned and cost effective implementation as far as resources (energy consumption) are concerned. © 2012 IFSA.
URI
http://hdl.handle.net/11615/32158
Collections
  • Δημοσιεύσεις σε περιοδικά, συνέδρια, κεφάλαια βιβλίων κλπ. [19735]

Related items

Showing items related by title, author, creator and subject.

  • Thumbnail

    Κατανεμημένο σύστημα ασφαλούς πρόσβασης 3 σταδίων με ιδιωτικό δυναμικό DNS και secure shell (SSH), με εφαρμογές στη ναυτιλία 

    Μήτρου-Μπιτζίνης, Πατάπιος-Γεώργιος Α. (2021)
  • Thumbnail

    Voice interactive personalized security (VoIPSEC) protocol: Fortify internet telephony by providing end-to-end security through inbound key exchange and biometric verification 

    Kopsidas, S.; Zisiadis, D.; Tassiulas, L. (2006)
    Secure end-to-end information exchange is a constant challenge in electronic communications. Novel security architectures and approaches are proposed constantly, to be followed by announcements of sophisticated attack ...
  • Thumbnail

    Voice interactive personalized security protocol: Definition and security analysis 

    Zisiadis, D.; Kopsidas, S.; Tassiulas, L. (2007)
    Security is a major issue in VoIP communications over the Internet, especially in mobile environments. Voice Interactive Personalized Security (VIPSec) constitutes a method for leveraging the security for Internet ...
htmlmap 

 

Parcourir

Tout DSpaceCommunautés & CollectionsPar date de publicationAuteursTitresSujetsCette collectionPar date de publicationAuteursTitresSujets

Mon compte

Ouvrir une sessionS'inscrire
Help Contact
DepositionAboutHelpContactez-nous
Choose LanguageTout DSpace
EnglishΕλληνικά
htmlmap