A middleware approach to provide security in IEEE 802.15.4 wireless sensor networks
Proceedings - 2013 International Conference on MOBILe Wireless MiddleWARE, Operating Systems and Applications, Mobilware 2013, Page: 85-93
2013
- 3Citations
- 15Captures
Metric Options: CountsSelecting the 1-year or 3-year option will change the metrics count to percentiles, illustrating how an article or review compares to other articles or reviews within the selected time period in the same journal. Selecting the 1-year option compares the metrics against other articles/reviews that were also published in the same calendar year. Selecting the 3-year option compares the metrics against other articles/reviews that were also published in the same calendar year plus the two years prior.
Example: if you select the 1-year option for an article published in 2019 and a metric category shows 90%, that means that the article or review is performing better than 90% of the other articles/reviews published in that journal in 2019. If you select the 3-year option for the same article published in 2019 and the metric category shows 90%, that means that the article or review is performing better than 90% of the other articles/reviews published in that journal in 2019, 2018 and 2017.
Citation Benchmarking is provided by Scopus and SciVal and is different from the metrics context provided by PlumX Metrics.
Example: if you select the 1-year option for an article published in 2019 and a metric category shows 90%, that means that the article or review is performing better than 90% of the other articles/reviews published in that journal in 2019. If you select the 3-year option for the same article published in 2019 and the metric category shows 90%, that means that the article or review is performing better than 90% of the other articles/reviews published in that journal in 2019, 2018 and 2017.
Citation Benchmarking is provided by Scopus and SciVal and is different from the metrics context provided by PlumX Metrics.
Conference Paper Description
Last years have seen the growth of interest for middleware exploitation in distributed resource-constrained systems as Wireless Sensor Networks (WSNs) are. A WSN is a versatile smart sensing system to support pervasive monitoring in a variety of applications. In this context available middleware platforms usually provide the Application Layer with different basic services, as shared memory or addressing repository, but do not usually provide security services such as secure links management protocol or intrusion detection. Nevertheless, since WSN applications normally require the collection and the aggregation of reliable measurements and data from the sensing units, secure communications should be guaranteed even in the presence of resource constraints. In this paper we then present a novel middleware approach that is directly tailored to an IEEE 802.15.4-based WSN. The security-related components of the proposed middleware include a light yet powerful cryptographic scheme (TAKS) and an Intrusion Detection System (WIDS): the former module exploits the topological properties of a WSN, while the latter one is based on a Weak Process Model approach. © 2013 European Alliance for Innovation.
Bibliographic Details
Institute of Electrical and Electronics Engineers (IEEE)
Provide Feedback
Have ideas for a new metric? Would you like to see something else here?Let us know