Research Article
A Middleware Approach for IEEE 802.15.4 Wireless Sensor Networks Security
@ARTICLE{10.4108/ue.2.5.e1, author={S. Marchesani and L. Pomante and M. Pugliese and F. Santucci}, title={A Middleware Approach for IEEE 802.15.4 Wireless Sensor Networks Security}, journal={EAI Endorsed Transactions on Ubiquitous Environments}, volume={2}, number={5}, publisher={ICST}, journal_a={UE}, year={2015}, month={7}, keywords={security, middleware, wireless sensor networks, cryptographic scheme, intrusion detection system}, doi={10.4108/ue.2.5.e1} }
- S. Marchesani
L. Pomante
M. Pugliese
F. Santucci
Year: 2015
A Middleware Approach for IEEE 802.15.4 Wireless Sensor Networks Security
UE
ICST
DOI: 10.4108/ue.2.5.e1
Abstract
Recent years have seen the growth of interest for middleware (MW) approaches in resource-constrained systems like Wireless Sensor Networks (WSNs). In this context, available MW platforms usually provide an Application Layer with different basic services, but do not provide security services such as secure links management or intrusion detection. Nevertheless, since WSN applications normally require the collection of reliable data from the sensing units, secure communications should be guaranteed even in the presence of resource constraints. So, this paper present a novel MW approach directly tailored to an IEEE 802.15.4-based WSN. The security-related components of the proposed MW include a light yet powerful cryptographic scheme (TAKS) and an Intrusion Detection System (WIDS). According to the performance and overhead assessment, we may argue that the proposed architecture has potentials to be exploited in realistic application scenarios that rely on the IEEE 802.15.4.
Copyright © 2015 L. Pomante et al., licensed to ICST. This is an open access article distributed under the terms of the Creative Commons Attribution licence (http://creativecommons.org/licenses/by/3.0/), which permits unlimited use, distribution and reproduction in any medium so long as the original work is properly cited.