Coordination middleware for secure wireless sensor networks
Title | Coordination middleware for secure wireless sensor networks |
Publication Type | Conference Paper |
Year of Publication | 2016 |
Authors | Nakamura, Y., Louvel, M., Nishi, H. |
Conference Name | IECON 2016 - 42nd Annual Conference of the IEEE Industrial Electronics Society |
Keywords | authentication, Ciphers, Collaboration, composability, control network devices, coordination middleware, cryptography, Encryption, Internet of Things, Internet-of-Things applications, middleware, personal information, pubcrawl, Resiliency, secure wireless sensor networks, security, security modules, telecommunication computing, telecommunication security, Wireless sensor networks, WSN security |
Abstract | Wireless sensor networks (WSNs) are implemented in various Internet-of-Things applications such as energy management systems. As the applications may involve personal information, they must be protected from attackers attempting to read information or control network devices. Research on WSN security is essential to protect WSNs from attacks. Studies in such research domains propose solutions against the attacks. However, they focus mainly on the security measures rather than on their ease in implementation in WSNs. In this paper, we propose a coordination middleware that provides an environment for constructing updatable WSNs for security. The middleware is based on LINC, a rule-based coordination middleware. The proposed approach allows the development of WSNs and attaches or detaches security modules when required. We implemented three security modules on LINC and on a real network, as case studies. Moreover, we evaluated the implementation costs while comparing the case studies. |
DOI | 10.1109/IECON.2016.7793771 |
Citation Key | nakamura_coordination_2016 |
- middleware
- WSN security
- wireless sensor networks
- telecommunication security
- telecommunication computing
- security modules
- security
- secure wireless sensor networks
- Resiliency
- pubcrawl
- personal information
- authentication
- Internet-of-Things applications
- Internet of Things
- encryption
- Cryptography
- coordination middleware
- control network devices
- composability
- collaboration
- Ciphers