2020
DOI: 10.1177/1550147720951673
|View full text |Cite
|
Sign up to set email alerts
|

Development of an extended topology-based lightweight cryptographic scheme for IEEE 802.15.4 wireless sensor networks

Abstract: Among the classes of wireless personal area networks, a wireless sensor network typically refers to a versatile and densely distributed sensing platform that enables the support of a wide variety of application domains. Among the various technical challenges addressed by more than one decade of research in wireless sensor networks, security across wireless links is by far one of the most critical ones and relates to the need of guaranteeing reliability and trustiness of the collected data. This article deals w… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 27 publications
(33 reference statements)
0
5
0
Order By: Relevance
“…WSN network topology is the physical or logical placement or arrangement of sensor nodes in an observed area of interest. It also includes how sensor nodes communicate within the network to collect data from the environment and transmit it to a base station via a sink node [81]. Topology requirements in WSN for EMAs vary depending on the environment and application.…”
Section: Topologymentioning
confidence: 99%
See 1 more Smart Citation
“…WSN network topology is the physical or logical placement or arrangement of sensor nodes in an observed area of interest. It also includes how sensor nodes communicate within the network to collect data from the environment and transmit it to a base station via a sink node [81]. Topology requirements in WSN for EMAs vary depending on the environment and application.…”
Section: Topologymentioning
confidence: 99%
“…The topology can self-organize when individual sensor nodes fail or deplete their energy. In dynamic topologies, when new nodes are added to the network after some nodes fail, the identity of the new node enters the network without changing the topology [81].…”
Section: Topologymentioning
confidence: 99%
“…The conventional key-based cryptographic system often required high computation which leads to in-efficient WSN [28]. Due to the energy and computation constrained nature of WSN, lightweight cryptographic schemes need to be implemented [29]. The paper [30] proposed a secure lightweight hash-based node verification protocol.…”
Section: IImentioning
confidence: 99%
“…The goal is the prevention of passive attacks on data through cryptography and also detection of active attacks against network availability. Specifically, the services provided by such a middleware will be: Party authentication service; Key generation and management service using WSN-specific mechanisms [65,66];…”
Section: Wireless Sensor Network Securitymentioning
confidence: 99%
“…Intrusion detection and threat estimation service [67,68]. The middleware and its services will improve the V&V processes by providing enhanced V&V methods (e.g., WPM-based IDS [66]) to check and to satisfy the SCP requirements in WSNs platforms. The middleware will be mainly tailored to real-world IEEE 802.15.4-based WSNs and also to other kind of resource-constrained network (e.g.…”
Section: Wireless Sensor Network Securitymentioning
confidence: 99%