Premium
Trust security mechanism for maritime wireless sensor networks
Author(s) -
Walid Elgenaidi,
Thomas Newe,
Eoin O'Connell,
Gerard Dooly
Publication year - 2016
Publication title -
concurrency and computation: practice and experience
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.309
H-Index - 67
eISSN - 1532-0634
pISSN - 1532-0626
DOI - 10.1002/cpe.3945
Subject(s) - computer science , node (physics) , computer network , wireless sensor network , computer security , testbed , network packet , encryption , key management , cryptography , sensor node , trust management (information system) , scheme (mathematics) , key distribution in wireless sensor networks , wireless , wireless network , engineering , operating system , mathematical analysis , mathematics , structural engineering
Summary To obtain a strong security system based on wireless sensor networks (WSNs), cryptographic‐based protocols are desired. Generally, the use of strong security mechanisms demand intensive use of limited resource, particularly memory storage and energy to provide defense services against malicious attacks. Risks detection in WSNs rely upon the behavior of every single sensor node in the system, and in the case of abnormal node behavior, the system protects the travelling packets on the network via a high level of security mechanisms such as a trusted key management algorithm. In this paper, we compare existing schemes and present a new hybrid security scheme suitable for maritime coastal environment–based WSNs. This scheme tackles the issues of memory storage of encryption keys based on a trusted node configuration, called a leader node, which works as a trusted third party for both the node joining and the node revoke processes. This security mechanism is implemented and tested in real time on a Waspmote sensor testbed platform. Copyright © 2016 John Wiley & Sons, Ltd.