978 - 988 - 98671 - 9 - 5 Wce 2008

نویسنده

  • Devesh C. Jinwala
چکیده

Ensuring network security in Wireless Sensor Networks (WSNs) indeed is critical. Due to the data-centric multi-hop communication in WSNs, an essential consideration in the security solutions for WSNs is to ensure security features at the link layer. The link layer security can be implemented in hardware or in software. The existing software based link layer security architectures do not offer configurable security. In this paper, we propose a novel design of link layer security architecture for WSNs. The principal characteristics of the design we propose, is the flexible and configurable architecture, with respect to the actual security attributes demanded by the application. Our design is based on the premise that when the link layer architecture is implemented in software, flexibility and seamless integration of the application code become the prime advantages. We also emphasize that with the increasing computational, storage and bandwidth resources of the sensor nodes, we can get good performance and efficiency from software implementation of link layer architecture also.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

U . K . Isbn : 978 - 988 - 98671 - 9 - 5 Wce 2008

algorithms are worthy of considering and efficiently to be utilized in the network topological deployment and keeping the network integrity, (2) the Partial Swarm Optimization is much algorithmically easier and reliable, (3) Intelligent computation is a kind of optimal methodology to improve the network integrity.

متن کامل

U . K . Isbn : 978 - 988 - 98671 - 9 - 5 Wce 2008

In this paper, we propose a new probabilistic approach designed for supervised classification of natural objects (vegetal and mineral) in high resolution aerial pictures. It consists of a two layered hidden Markov models (HMM) based approach which takes into account the spatial correlations between natural objects. The performance of our approach has been tested on real world high resolution ae...

متن کامل

, U . K . Isbn : 978 - 988 - 98671 - 9 - 5 Wce 2008

techniques that provide firewall-level authentication to ensure authorized access to potentially vulnerable network services. Although these techniques serve as powerful protection mechanism against the intruders, they still suffer from a major problem. The lack of association between the authentication process and the follow-on TCP connection to be established is the most crucial problem still...

متن کامل

Agent-Based Perception of an Environment in an Emergency Situation

We are interested in the problem of multiagent systems development for risk detecting and emergency response in an uncertain and partially perceived environment. The evaluation of the current situation passes by three stages inside the multiagent system. In a first time, the situation is represented in a dynamic way. The second step, consists to characterise the situation and finally, it is com...

متن کامل

U . K . Isbn : 978 - 988 - 17012 - 3 - 7 Wce 2008

than the initial shapes do. By this optimal design method, the algorithm introduced more parameters (twisted angles) for aerodynamic configuration design, and thus demonstrates better of feasibility, robustness, and design outcome for subsonic wing configuration. The resulting outcomes confirm that the method shows quicker in convergence, in comparison to the traditional genetic algorithms.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008