Security management in heterogeneous distributed sensor networks
A Heterogeneous Distributed Sensor Network (HDSN) is a type of distributed sensor network where sensors with different functional types participate at the same time. In this sensor network model, the sensors are associated with different deployment groups but they cooperate with each other within an...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Book Chapter |
Language: | English |
Published: |
IGI Global Publishers
2011
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/579/1/Final_spathan_formattedChapter.pdf http://irep.iium.edu.my/579/ http://www.igi-global.com/bookstore/titledetails.aspx?titleid=51947 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | A Heterogeneous Distributed Sensor Network (HDSN) is a type of distributed sensor network where sensors with different functional types participate at the same time. In this sensor network model, the sensors are associated with different deployment groups but they cooperate with each other within and out of their respective groups. The heterogeneity of HDSN refers to the functional heterogeneity of the sensors participating in the network unlike the heterogeneity considered (e.g., considering transmission range, energy level, computation ability, sensing range) for traditional heterogeneous sensor networks. Taking this model into consideration, in this chapter we present a secure group association authentication mechanism using one-way accumulator which ensures that; before collaborating for a particular task, any pair of nodes in the same deployment group can verify the legitimacy of group association of each other. Secure addition and deletion of sensors are supported in this approach. In addition, a policy-based sensor addition procedure is also suggested. For secure handling of disconnected nodes of a group, we use an efficient pairwise key derivation scheme. Side by side proposing our mechanisms, we also discuss the characteristics of HDSN, its scopes, applicability, efficiency, challenges, and future. Before concluding the chapter, we also talk about the applicability of our security management framework for secure mobile multimedia delivery over sensor networks. |
---|