About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
ue 15(5): e1

Research Article

A Middleware Approach for IEEE 802.15.4 Wireless Sensor Networks Security

Download1340 downloads
Cite
BibTeX Plain Text
  • @ARTICLE{10.4108/ue.2.5.e1,
        author={S. Marchesani and L. Pomante and M. Pugliese and F. Santucci},
        title={A Middleware Approach for IEEE 802.15.4 Wireless Sensor Networks Security},
        journal={EAI Endorsed Transactions on Ubiquitous Environments},
        volume={2},
        number={5},
        publisher={ICST},
        journal_a={UE},
        year={2015},
        month={7},
        keywords={security, middleware, wireless sensor networks, cryptographic scheme, intrusion detection system},
        doi={10.4108/ue.2.5.e1}
    }
    
  • S. Marchesani
    L. Pomante
    M. Pugliese
    F. Santucci
    Year: 2015
    A Middleware Approach for IEEE 802.15.4 Wireless Sensor Networks Security
    UE
    ICST
    DOI: 10.4108/ue.2.5.e1
S. Marchesani1, L. Pomante1,*, M. Pugliese1, F. Santucci1
  • 1: University of L’Aquila – DEWS (ITALY)
*Contact email: luigi.pomante@univaq.it

Abstract

Recent years have seen the growth of interest for middleware (MW) approaches in resource-constrained systems like Wireless Sensor Networks (WSNs). In this context, available MW platforms usually provide an Application Layer with different basic services, but do not provide security services such as secure links management or intrusion detection. Nevertheless, since WSN applications normally require the collection of reliable data from the sensing units, secure communications should be guaranteed even in the presence of resource constraints. So, this paper present a novel MW approach directly tailored to an IEEE 802.15.4-based WSN. The security-related components of the proposed MW include a light yet powerful cryptographic scheme (TAKS) and an Intrusion Detection System (WIDS). According to the performance and overhead assessment, we may argue that the proposed architecture has potentials to be exploited in realistic application scenarios that rely on the IEEE 802.15.4.

Keywords
security, middleware, wireless sensor networks, cryptographic scheme, intrusion detection system
Received
2015-04-27
Accepted
2015-05-28
Published
2015-07-13
Publisher
ICST
http://dx.doi.org/10.4108/ue.2.5.e1

Copyright © 2015 L. Pomante et al., licensed to ICST. This is an open access article distributed under the terms of the Creative Commons Attribution licence (http://creativecommons.org/licenses/by/3.0/), which permits unlimited use, distribution and reproduction in any medium so long as the original work is properly cited.

EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL