A Framework of Deployment Strategy for Hierarchical WSN Security Management
نویسندگان
چکیده
The heterogeneity and relative limited resources of the nodes deployed in hierarchical wireless sensor network (WSN) impose a new strategy to guarantee security and confidentiality. A deployment strategy is proposed and focuses on two different levels: complexity of the scheme and security requirement for the application. Three different cryptography mechanisms may be concurrently used in the same framework: PKI distribution, identity-based encryption and symmetric cryptography. As each mechanism highlights drawbacks and advantages, criteria are proposed to associate each node with the most relevant security mechanism according to its capability and environment.
منابع مشابه
Optimal Strategies of Increasing Business Alignment, in Social Security Organization, with Quality Function Deployment (QFD) Approach
Considering the importance of the concept of strategic alignment of information technology (IT) in today economic organizations, this study attempted to extract the organization's IT strategies in order to increase the degree of strategic alignment and consequently the optimal strategies in the field of marketing and service delivery for social security organization. Using QFD technique and hie...
متن کاملA novel key management scheme for heterogeneous sensor networks based on the position of nodes
Wireless sensor networks (WSNs) have many applications in the areas of commercial, military and environmental requirements. Regarding the deployment of low cost sensor nodes with restricted energy resources, these networks face a lot of security challenges. A basic approach for preparing a secure wireless communication in WSNs, is to propose an efficient cryptographic key management protocol be...
متن کاملارائه مدلی جهت استفاده ازعاملهای متحرک در سیستم های تشخیص نفوذ توزیع شده مبتنی بر تئوری بازی
The proposed framework applies two game theoretic models for economic deployment of intrusion detection system (IDS). The first scheme models and analyzes the interaction behaviors of between an attacker and intrusion detection agent within a non-cooperative game, and then the security risk value is derived from the mixed strategy Nash equilibrium. The second scheme uses the security risk value...
متن کاملFuzzy BSQ چارچوب تدوین استراتژی: ترکیبی از روش ارزیابی متوازن، تجزیه و تحلیل SWOT و گسترش عملکرد کیفیت با رویکرد غربالسازی فازی
Many of the so-called organizational strategies on which companies are dependent, are not endurable. These strategies may not be well structured and cannot stand the test of time. Thus, making the right decision is extremely important for strategic planning. The proposed strategy formulation framework in this paper (Fuzzy BSQ) is a powerful management tool in strategic planning that integrates ...
متن کاملSecurity Model for Hierarchical Clustered Wireless Sensor Networks
The proposed security system for the Wireless Sensor Network (WSN) is based on the WSN security design goal that ‘to design a completely secure WSN, security must be integrated into every node of the system’. This paper discusses on two main components of the security framework viz. the secure key management module and the secure routing scheme. The incorporation of security mechanism during th...
متن کامل