WIRELESS SENSOR NETWORK: TOWARDS AN IMPROVEMENT OF SECURITY POLICY

Abstract. The design of these applications is based on trust between the nodes constituting the network. Unfortunately, when deploying randomly in difficult hostile areas, seeing impossible to monitor, not to mention the uncertainty of the communication channel, the sensor nodes are exposed to all types of attacks and intrusions, which can hinder and prevent the diffusion of the information between the sensor nodes of the network, and influencing its performance. Many approaches have been proposed to solve security problems in wireless networks. The solutions can be mainly classified into two categories: symmetric and asymmetric key management schemes. Indeed it is clear, that the optimal solution in this case is to use symmetric shared key systems. In this paper, the idea of LEAP improved is to apply the same Mechanisms used in LEAP Enhanced to overcome a compromised node and also prevent a compromised base station node while using a multiple base station network, this will, on the one hand, minimize power consumption, and secondly, to replace a base station in the event of a compromise, to ensure the continuity and proper functioning of the network. The evaluation of the proposed solution was carried out using the TOSSIM simulation tool.

Standort
Deutsche Nationalbibliothek Frankfurt am Main
Umfang
Online-Ressource
Sprache
Englisch

Erschienen in
WIRELESS SENSOR NETWORK: TOWARDS AN IMPROVEMENT OF SECURITY POLICY ; volume:XLVI-4/W5-2021 ; year:2021 ; pages:379-383 ; extent:5
The International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences ; XLVI-4/W5-2021 (2021), 379-383 (gesamt 5)

Urheber
Moulad, L.
Chaabita, R.
Balar, K.

DOI
10.5194/isprs-archives-XLVI-4-W5-2021-379-2021
URN
urn:nbn:de:101:1-2021123004153185087486
Rechteinformation
Open Access; Der Zugriff auf das Objekt ist unbeschränkt möglich.
Letzte Aktualisierung
15.08.2025, 07:32 MESZ

Datenpartner

Dieses Objekt wird bereitgestellt von:
Deutsche Nationalbibliothek. Bei Fragen zum Objekt wenden Sie sich bitte an den Datenpartner.

Beteiligte

  • Moulad, L.
  • Chaabita, R.
  • Balar, K.

Ähnliche Objekte (12)