3rd International ICST Workshop on Information Fusion and Dissemination in Wireless Sensor Networks

Research Article

Secure self-adaptive mission-critical communication for distributed smart home sensor network

Download288 downloads
  • @INPROCEEDINGS{10.4108/ICST.MOBIQUITOUS2009.7059,
        author={Rajani  Muraleedharan and Lisa Ann  Osadciw},
        title={Secure self-adaptive mission-critical communication for distributed smart home sensor network},
        proceedings={3rd International ICST Workshop on Information Fusion and Dissemination in Wireless Sensor Networks},
        publisher={IEEE},
        proceedings_a={SENSORFUSIONS},
        year={2009},
        month={11},
        keywords={Biosensors Communication system security Cryptography Energy efficiency Intelligent sensors Mission critical systems Sensor phenomena and characterization Smart homes Wireless application protocol Wireless sensor networks},
        doi={10.4108/ICST.MOBIQUITOUS2009.7059}
    }
    
  • Rajani Muraleedharan
    Lisa Ann Osadciw
    Year: 2009
    Secure self-adaptive mission-critical communication for distributed smart home sensor network
    SENSORFUSIONS
    IEEE
    DOI: 10.4108/ICST.MOBIQUITOUS2009.7059
Rajani Muraleedharan1,*, Lisa Ann Osadciw1,*
  • 1: Department ofElectrical Engineering and Computer Science, Syracuse University, Syracuse, NY- 13244-1240, Phone: 315-443-3366/Fax: 315-443-2583
*Contact email: rmuralee@ecs.syr.edu, laosadci@ecs.syr.edu

Abstract

The inexpensive tiny wireless sensor can be embedded in devices to enable any commercial application, but are prone to intruder attacks. Due to the limited resource constraint in wireless sensor network, security in protocols is sacrificed or kept minimal. The distributive and self-organizing nature of sensor based on environment requires protocol to be adaptive, energy efficient and secure. In this paper, we analyze the different encryption schemes and their shortcoming in providing an energy efficient solution for sensor network. Secondly, we propose a communication protocol that balances resources while achieving mission critical solution using bio-inspired multi-objective algorithm. Thirdly, the accuracy of threat detection is analyzed using threshold approach based on sensor characteristics.