Security Completeness Problem in Wireless Sensor Networks

Riaz Ahmed Shaikh, Sungyoung Lee, Aiiad Albeshri

Research output: Contribution to journalArticlepeer-review

2 Citations (Scopus)

Abstract

With the emergence of wireless sensor networks and its usage in sensitive monitoring and tracking applications, the need of ensuring complete security is gaining more importance than ever before. Complete security can only be ensured by adding privacy, cryptographic-based security and trust management aspects in a security solution. However, integration of all these three aspects in a single solution for resource constraints wireless sensor networks is not trivial. Current research intensively focuses on all these three aspects in an isolated manner. To the best of our knowledge, we have not found any work in the literature that comprehensively discusses: how these various privacy, security and trust solutions work together? In this work, we have made the first step towards this direction and to show how integration of various privacy, security and trust solutions can be performed in a single solution in step-by-step manner.

Original languageEnglish
Pages (from-to)235-250
Number of pages16
JournalIntelligent Automation and Soft Computing
Volume21
Issue number2
DOIs
Publication statusPublished - 3 Apr 2015

Keywords

  • Privacy
  • Security
  • Trust
  • Wireless sensor networks

Cite this