Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor Networks. Dr. Deepak Choudhary, Dr.Umesh Sehgal ACEEE International Journal on Network Security, 3(4):6, October, 2012.
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor Networks [link]Paper  abstract   bibtex   
Networks of wireless micro-sensors for monitoring physical environments have emerged as an important new application area for wireless technology. Key attributes of these new types of networked systems are the severely constrained computational and energy resources and an ad hoc operational environment. This paper is a study of the communication security aspects of these networks. Resource limitations and specific architecture of sensor networks call for customized security mechanisms. Our approach is to classify the types of data existing in sensor networks, and identify possible communication security threats according to that classification. We propose a communication security scheme where for each type of data we define a corresponding security mechanism. By employing this multi-tiered security architecture where each mechanism has different resource requirements, we allow for efficient resource management, which is essential for wireless sensor networks.
@article{drdeepakchoudharydrumeshsehgal2012multitiered,
  abstract = {Networks of wireless micro-sensors for monitoring
physical environments have emerged as an important new
application area for wireless technology. Key attributes of
these new types of networked systems are the severely
constrained computational and energy resources and an ad
hoc operational environment. This paper is a study of the
communication security aspects of these networks. Resource
limitations and specific architecture of sensor networks call
for customized security mechanisms. Our approach is to
classify the types of data existing in sensor networks, and
identify possible communication security threats according
to that classification. We propose a communication security
scheme where for each type of data we define a corresponding
security mechanism. By employing this multi-tiered security
architecture where each mechanism has different resource
requirements, we allow for efficient resource management,
which is essential for wireless sensor networks.},
  added-at = {2013-01-09T06:05:20.000+0100},
  author = {{Dr. Deepak Choudhary, Dr.Umesh Sehgal}, Dr. Neeru Gupta},
  biburl = {https://www.bibsonomy.org/bibtex/2262d0ce86f6ef3b716753743ea5c521e/ideseditor},
  editor = {Das, Dr. Vinu V},
  interhash = {265fafb28ce5ceec5a36eeb005fb3a3a},
  intrahash = {262d0ce86f6ef3b716753743ea5c521e},
  journal = {ACEEE International Journal on Network Security},
  keywords = {sensor wireless networks communication},
  month = {October},
  number = 4,
  pages = 6,
  timestamp = {2013-01-09T06:24:37.000+0100},
  title = {Multi-Tiered Communication Security Schemes in
Wireless Ad-Hoc Sensor Networks},
  url = {http://doi.searchdl.org/01.IJNS.3.4.5},
  volume = 3,
  year = 2012
}

Downloads: 0