Web Hosting Articles

  Home arrow Web Hosting Articles arrow Wireless Sensor Networks: Security Req...
Web Hosting Articles  
Web Hosting FAQs  
Web Hosting How-Tos  
Web Hosting News  
Web Hosting Reviews  
Web Hosting Security  
Weekly Newsletter 
 
Developer Updates  
Free Website Content 
 RSS  Articles
 RSS  Forums
 RSS  All Feeds
Write For Us 
Contact Us 
Site Map 
Privacy Policy 
Support 
 USERNAME
 
 PASSWORD
 
 
  >>> SIGN UP!  
  Lost Password? 
WEB HOSTING ARTICLES

Wireless Sensor Networks: Security Requirements
By: Eliana Stavrou
  • Search For More Articles!
  • Disclaimer
  • Author Terms
  • Rating: 4 stars4 stars4 stars4 stars4 stars / 22
    2005-07-06

    Table of Contents:
  • Wireless Sensor Networks: Security Requirements
  • Authentication, Integrity, and Freshness
  • Security Management, Availability, and Quality

  • Rate this Article: Poor Best 
      ADD THIS ARTICLE TO:
      Del.ici.ous Digg
      Blink Simpy
      Google Spurl
      Y! MyWeb Furl
    Email Me Similar Content When Posted
    Add Developer Shed Article Feed To Your Site
    Email Article To Friend
    Print Version Of Article
    PDF Version Of Article
     
     

    SEARCH WEB HOSTERS

    TOOLS YOU CAN USE

    advertisement

    Wireless Sensor Networks: Security Requirements


    (Page 1 of 3 )

    In two previous articles, I analyzed issues related to sensor networks topology, sensor nodes uses, hardware design, limitations and open issues that raise challenges for researchers and developers. This third part of the Wireless Sensor Networks article is focused on security requirements related with sensor nodes operation.

    1. Security Requirements

    As mentioned in the previous articles (Introduction and Limitations), sensor networks are used in a number of domains that handle sensitive information. Due to this, there are many considerations that should be investigated and are related with protecting sensitive information traveling between nodes (which are either sensor nodes or the base station) from been disclosure to unauthorized third parties.

    The scope of this article is to analyze basic security concepts before moving into a detail discussion of the various security issues. It is essential to first understand the security requirements that are raised in a sensor environment; by doing so, we could apply appropriate security techniques to ensure the protection and safety of data and systems involved in a more spherical approach. By knowing what we are trying to protect, we could develop a comprehensive and strong security approach to overcome possible security breaches; after all, in order to protect something you must first know that is in danger.  Since sensor networks are still a developing technology. Researchers and developers agree that their efforts should be concentrated in developing and integrating security from the initial phases of sensor applications development; by doing so, they hope to provide a stronger and complete protection against illegal activities maintaining at the same time the stability of the system, rather than adding on security functionality after the application is finished.

    Moving on, next section analyzes the security requirements that constitute fundamental objectives based on which every sensor application should adhere in order to guarantee an appropriate level of security.

    1.1 Confidentiality

    Confidentiality requirement is needed to ensure that sensitive information is well protected and not revealed to unauthorized third parties.

    The confidentiality objective is required in sensors’ environment to protect information traveling between the sensor nodes of the network or between the sensors and the base station from disclosure, since an adversary having the appropriate equipment may eavesdrop on the communication. By eavesdropping, the adversary could overhear critical information such as sensing data and routing information. Based on the sensitivity of the data stolen, an adversary may cause severe damage since he can use the sensing data for many illegal purposes i.e. sabotage, blackmail. For example, competitors may use the data to produce a better product i.e. safety monitoring sensor application. Furthermore, by stealing routing information the adversary could introduce his own malicious nodes into the network in an attempt to overhear the entire communication.

    If we consider eavesdropping to be a network level threat, then a local level threat could be a compromised node that an adversary has in his possession. Compromised nodes are a big threat to confidentiality objective since the adversary could steal critical data stored on nodes such as cryptographic keys that are used to encrypt the communication.

    More Web Hosting Articles Articles
    More By Eliana Stavrou

    WEB HOSTING ARTICLES ARTICLES

    - Top Wordpress Plugins for SEO
    - Top Drupal Evaluation and Rating Modules
    - Free Network Monitoring Programs for Max Per...
    - E-store Hosting: Free Options for Beginners
    - Dropbox: The Ultimate File-Sharing and Synci...
    - Reviewing the Best Free Web Hosting Sites
    - Businesses Turn to Reseller Web Hosting for ...
    - Multiple Data Center Hosting
    - Web Hosting Goes Green
    - Web Hosting Technology Overview
    - Collaborate: An Examination of Tools for Gro...
    - Social Networking Security
    - Domain Names 101
    - Top Software to Help Manage Your Websites
    - The Evolution of Phishing

    Developer Shed Affiliates

     




    © 2003-2017 by Developer Shed. All rights reserved. DS Cluster - Follow our Sitemap