Zur Kurzanzeige

dc.creatorPerlepes, L.en
dc.creatorZaharis, A.en
dc.creatorStamoulis, G.en
dc.creatorKikiras, P.en
dc.date.accessioned2015-11-23T10:45:22Z
dc.date.available2015-11-23T10:45:22Z
dc.date.issued2012
dc.identifier.issn17265479
dc.identifier.urihttp://hdl.handle.net/11615/32158
dc.description.abstractTypical sensor nodes are resource constrained devices containing user level applications, operating system components, and device drivers in a single address space, with no form of memory protection. A malicious user could easily capture a node and tamper the applications running on it, in order to perform different types of attacks. In this paper, we propose a 3-layer Security Framework composed by physical security schemes, cryptography of communication channels and live forensics protection techniques that allows for secure WSN deployments. Each of the abovementioned techniques maximizes the security levels leading to a tamper proof sensor node. By applying the proposed security framework, secure communication between nodes is guaranteed, identified captured nodes are silenced and their destructive effect on the rest of the network infrastructure is minimized due to the early measures applied. Our main concern is to propose a framework that balances its attributes between robustness, as long as security is concerned and cost effective implementation as far as resources (energy consumption) are concerned. © 2012 IFSA.en
dc.source.urihttp://www.scopus.com/inward/record.url?eid=2-s2.0-84874101347&partnerID=40&md5=072a73151bd42b02a31681c312baed31
dc.subjectCryptographyen
dc.subjectLive forensicsen
dc.subjectSand-boxingen
dc.subjectSecurity frameworken
dc.subjectWireless sensor networksen
dc.subjectAddress spaceen
dc.subjectCost-effective implementationsen
dc.subjectDestructive effectsen
dc.subjectDevice Driveren
dc.subjectMemory protectionen
dc.subjectNetwork infrastructureen
dc.subjectPhysical securityen
dc.subjectProtection techniquesen
dc.subjectResourceconstrained devicesen
dc.subjectSandboxingen
dc.subjectSecure communicationsen
dc.subjectSecure dataen
dc.subjectSecurity frameworksen
dc.subjectSecurity levelen
dc.subjectTamper proofen
dc.subjectUser levelsen
dc.subjectEnergy utilizationen
dc.subjectSensor nodesen
dc.titleA framework for secure data delivery in wireless sensor networksen
dc.typejournalArticleen


Dateien zu dieser Ressource

DateienGrößeFormatAnzeige

Zu diesem Dokument gibt es keine Dateien.

Das Dokument erscheint in:

Zur Kurzanzeige