Security Completeness Problem in Wireless Sensor Networks

Shaikh, Riaz Ahmed ORCID: https://orcid.org/0000-0001-6666-0253, Lee, Sungyoung and Albeshri, Aiiad (2015) Security Completeness Problem in Wireless Sensor Networks. Intelligent Automation and Soft Computing, 21 (2). pp. 235-250. ISSN 1079-8587

Full text not available from this repository. (Request a copy)

Abstract

With the emergence of wireless sensor networks and its usage in sensitive monitoring and tracking applications, the need of ensuring complete security is gaining more importance than ever before. Complete security can only be ensured by adding privacy, cryptographic-based security and trust management aspects in a security solution. However, integration of all these three aspects in a single solution for resource constraints wireless sensor networks is not trivial. Current research intensively focuses on all these three aspects in an isolated manner. To the best of our knowledge, we have not found any work in the literature that comprehensively discusses: how these various privacy, security and trust solutions work together? In this work, we have made the first step towards this direction and to show how integration of various privacy, security and trust solutions can be performed in a single solution in step-by-step manner.

Item Type: Article
Additional Information: Funding Information: This research was supported by the MSIP (Ministry of Science, ICT & Future Planning), Korea, under the ITRC (Information Technology Research Center) support program supervised by the NIPA (National IT Industry Promotion Agency) (NIPA-2014-(H0301-14-1003)). This work was also supported by the Industrial Core Technology Development Program (100,49079, Development of Mining core technology exploiting personal big data) funded by the Ministry of Trade, Industry and Energy (MOTIE, Korea). Publisher Copyright: © 2014 TSI Press.
Uncontrolled Keywords: privacy,security,trust,wireless sensor networks,software,theoretical computer science,computational theory and mathematics,artificial intelligence ,/dk/atira/pure/subjectarea/asjc/1700/1712
Faculty \ School: Faculty of Science > School of Computing Sciences
UEA Research Groups: Faculty of Science > Research Groups > Cyber Security Privacy and Trust Laboratory
Related URLs:
Depositing User: LivePure Connector
Date Deposited: 16 Aug 2022 15:31
Last Modified: 07 May 2023 06:30
URI: https://ueaeprints.uea.ac.uk/id/eprint/87328
DOI: 10.1080/10798587.2014.970345

Actions (login required)

View Item View Item