TY - GEN
T1 - Security in future mobile sensor networks - Issues and challenges
AU - Stavrou, Eliana
AU - Pitsillides, Andreas
AU - Hadjichristofi, George
AU - Hadjicostis, Christoforos
PY - 2010
Y1 - 2010
N2 - Existing security research in wireless sensor networks is based on specific assumptions about the nodes and the network environment that are tied to specific usage scenarios. Typical scenarios consider sensor nodes that are immobile and have pre-defined communication patterns. We argue that node mobility is a realistic characteristic of sensor nodes that needs to be taken into consideration in future sensor networks. Mobility capabilities can address the objective challenges raised in mission-critical applications, such as in disaster relief, where their environment characteristics fluctuate over time. It is imperative to investigate the way security is affected in mobile sensor networks and identify the challenges that will need to be addressed in future security protocol design. We present our vision for future sensor networks through a realistic scenario and discuss security gaps that are present in existing research for next generation sensor networks.
AB - Existing security research in wireless sensor networks is based on specific assumptions about the nodes and the network environment that are tied to specific usage scenarios. Typical scenarios consider sensor nodes that are immobile and have pre-defined communication patterns. We argue that node mobility is a realistic characteristic of sensor nodes that needs to be taken into consideration in future sensor networks. Mobility capabilities can address the objective challenges raised in mission-critical applications, such as in disaster relief, where their environment characteristics fluctuate over time. It is imperative to investigate the way security is affected in mobile sensor networks and identify the challenges that will need to be addressed in future security protocol design. We present our vision for future sensor networks through a realistic scenario and discuss security gaps that are present in existing research for next generation sensor networks.
KW - Key management
KW - Routing
KW - Security
KW - Sensor networks
KW - Trust management
UR - http://www.scopus.com/inward/record.url?scp=78651452657&partnerID=8YFLogxK
M3 - Conference contribution
AN - SCOPUS:78651452657
SN - 9789898425188
T3 - SECRYPT 2010 - Proceedings of the International Conference on Security and Cryptography
SP - 278
EP - 286
BT - SECRYPT 2010 - Proceedings of the International Conference on Security and Cryptography
T2 - International Conference on Security and Cryptography, SECRYPT 2010
Y2 - 26 July 2010 through 28 July 2010
ER -