Mohammad Al-Rousan
A novel situation specific network security for Wireless Sensor Networks
Al-Rousan, Mohammad; Bani Yassein, Muneer; Al-Dubai, Ahmed; Ghaleb, Barraq; Mahmoud, Ibrahim
Authors
Muneer Bani Yassein
Prof Ahmed Al-Dubai A.Al-Dubai@napier.ac.uk
Professor
Dr Baraq Ghaleb B.Ghaleb@napier.ac.uk
Associate Professor
Ibrahim Mahmoud
Abstract
Researchers have come up with many high level security protocols and key management algorithms that can be applied for different types of networks. The main characteristics of wireless sensor networks that are limited computation and power made it difficult to apply these secure key management algorithms since it consumes much power and resources. Sensors in the field at different periods of time of their life time need higher level of security more than other times - sensors in a battlefield need higher security when it is war time.
In our research we developed an adaptive security protocol for two-layer clustered heterogeneous wireless sensor networks that can toggle between five different modes of operation, each with different security level. Each level of security has its own encryption/decryption algorithm and specified key length depending on the situation of the application and the situation for the wireless sensor networks.
Citation
Al-Rousan, M., Bani Yassein, M., Al-Dubai, A., Ghaleb, B., & Mahmoud, I. (2015). A novel situation specific network security for Wireless Sensor Networks. Sensors & transducers, 186(3), 33-42
Journal Article Type | Article |
---|---|
Publication Date | 2015-03 |
Deposit Date | Apr 13, 2015 |
Print ISSN | 1726-5479 |
Peer Reviewed | Peer Reviewed |
Volume | 186 |
Issue | 3 |
Pages | 33-42 |
Keywords | Sensor network; Security; Key management; Clustered heterogeneous; |
Public URL | http://researchrepository.napier.ac.uk/id/eprint/7731 |
Publisher URL | http://www.sensorsportal.com/HTML/DIGEST/march_2015/Vol_186/P_2620.pdf |
You might also like
Novel Lagrange Multipliers-Driven Adaptive Offloading for Vehicular Edge Computing
(2024)
Journal Article
ML-Driven Attack Detection in RPL Networks: Exploring Attacker Position's Significance
(2024)
Presentation / Conference Contribution
A Novel Autonomous Adaptive Frame Size for Time-Slotted LoRa MAC Protocol
(2024)
Journal Article
Chaotic Quantum Encryption to Secure Image Data in Post Quantum Consumer Technology
(2024)
Journal Article
Downloadable Citations
About Edinburgh Napier Research Repository
Administrator e-mail: repository@napier.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2024
Advanced Search