ue 15(5): e1

Research Article

A Middleware Approach for IEEE 802.15.4 Wireless Sensor Networks Security

Download182 downloads
  • @ARTICLE{10.4108/ue.2.5.e1,
        author={S. Marchesani and L. Pomante and M. Pugliese and F. Santucci},
        title={A Middleware Approach for IEEE 802.15.4 Wireless Sensor Networks Security},
        journal={EAI Endorsed Transactions on Ubiquitous Environments},
        volume={2},
        number={5},
        publisher={ICST},
        journal_a={UE},
        year={2015},
        month={7},
        keywords={security, middleware, wireless sensor networks, cryptographic scheme, intrusion detection system},
        doi={10.4108/ue.2.5.e1}
    }
    
  • S. Marchesani
    L. Pomante
    M. Pugliese
    F. Santucci
    Year: 2015
    A Middleware Approach for IEEE 802.15.4 Wireless Sensor Networks Security
    UE
    ICST
    DOI: 10.4108/ue.2.5.e1
S. Marchesani1, L. Pomante1,*, M. Pugliese1, F. Santucci1
  • 1: University of L’Aquila – DEWS (ITALY)
*Contact email: luigi.pomante@univaq.it

Abstract

Recent years have seen the growth of interest for middleware (MW) approaches in resource-constrained systems like Wireless Sensor Networks (WSNs). In this context, available MW platforms usually provide an Application Layer with different basic services, but do not provide security services such as secure links management or intrusion detection. Nevertheless, since WSN applications normally require the collection of reliable data from the sensing units, secure communications should be guaranteed even in the presence of resource constraints. So, this paper present a novel MW approach directly tailored to an IEEE 802.15.4-based WSN. The security-related components of the proposed MW include a light yet powerful cryptographic scheme (TAKS) and an Intrusion Detection System (WIDS). According to the performance and overhead assessment, we may argue that the proposed architecture has potentials to be exploited in realistic application scenarios that rely on the IEEE 802.15.4.