CISUC

A secure interconnection model for IPv6 enabled Wireless Sensor Networks

Authors

Abstract

The usage of IPv6 on Wireless Sensor Networks (WSNs) can enable the integration of existing and new sensing applications with the Internet, therefore contributing to a major evolution towards the realization of the internet of things. We believe this vision to be realizable only if security is properly addressed. Although many proposals do exist in the literature to address specific security issues on sensor networks, a new security model and security mechanisms are needed to support the secure integration of IP enabled WSNs with the Internet. Such a security model should allow for end-to-end security and should be able to provide mechanisms that allow for the flexible adaptation of security to the resource limitations of sensor nodes.
We propose and evaluate a new secure interconnection model and security mechanisms to enable the secure integration of IP enabled WSNs with the Internet. Our model introduces 6lowpan security headers to enable end-to-end security between sensor nodes and hosts in the Internet, while also providing mechanisms to selectively control the energy expended with security operations on the WSN. Although the usage of security at the network layer on WSNs is not consensual, we believe that its proper design and implementation can bring a substantial contribution to the evolution of the Internet.

Subject

Wireless Sensor Networks

Conference

IFIP Wireless Days 2010, October 2010


Cited by

Year 2015 : 3 citations

 Meena, Ramesh Chand, and Mahesh Bundele. "A Review on Implementation Issues in IPv6 Network Technology."

 Kasraoui, Mohamed, Adnane Cabani, and Houcine Chafouk. "Collaborative Key Exchange System Based on Chinese Remainder Theorem in Heterogeneous Wireless Sensor Networks." International Journal of Distributed Sensor Networks 501 (2015): 159518.

 Kasraoui, M., A. Cabani, and H. Chafouk. "Secure collaborative system in heterogenous wireless sensor networks." Journal of applied research and technology 13.2 (2015): 342-350.

Year 2014 : 3 citations

 Vucinic, Malisa, et al. "OSCAR: Object Security Architecture for the Internet of Things." arXiv preprint arXiv:1404.7799 (2014).

 Singh, Er Gurjot, and Er Sandeep Kaur Dhanda. "Quality of Service Enhancement of Wireless Sensor Network Using Symmetric Key Cryptographic Schemes." IJ Information Technology and Computer Science 8 (2014): 32-42.

 Manifavas, Charalampos, et al. "Embedded Systems Security: A Survey of EU Research Efforts." Security and Communication Networks (2014).

Year 2013 : 1 citations

 Yu, Hong, et al. "Enabling end-to-end secure communication between wireless sensor networks and the Internet." World Wide Web (2013): 1-26.

Year 2012 : 5 citations

 Yu, Hong, Jingsha He, Ting Zhang, Peng Xiao, and Yuqiang Zhang. "Enabling end-to-end secure communication between wireless sensor networks and the Internet." World Wide Web (2012): 1-26.

 TLS with PSK for Constrained Devices, Vladislav Perelman (Jacobs University, Germany) and Mehmet Ersue (Nokia Siemens Networks, Germany). February 20, 2012.

 Security in IPv6-enabled Wireless Sensor Networks: An Implementation of TLS/DTLS for the Contiki Operating System. Vladislav Perelman, Master thesis, Jacobs University — School of Engineering and Science, Germany, June 2012.

 Yu, Hong, Jingsha He, Ting Zhang, and Peng Xiao. "A group key distribution scheme for wireless sensor networks in the internet of things scenario." International Journal of Distributed Sensor Networks 2012 (2012).

 Perelman, Vladislav. "Security in IPv6-enabled Wireless Sensor Networks: An Implementation of TLS/DTLS for the Contiki Operating System."