2010 Seventh International Conference on Networked Sensing Systems (INSS) 2010
DOI: 10.1109/inss.2010.5573944
|View full text |Cite
|
Sign up to set email alerts
|

Design of an architecture for multiple security levels in wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2012
2012
2017
2017

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 12 publications
0
4
0
Order By: Relevance
“…They organized the network using Hasse diagram then compute the key for each individual node and extend it further to construct the key for a group. In [12], Lee and Singhal introduced the concept of multiple security levels (MSL), which segregates different security levels by using a different computing infrastructure. They proposed an architecture to achieve the MLS property based on MSL concept.…”
Section: Related Workmentioning
confidence: 99%
“…They organized the network using Hasse diagram then compute the key for each individual node and extend it further to construct the key for a group. In [12], Lee and Singhal introduced the concept of multiple security levels (MSL), which segregates different security levels by using a different computing infrastructure. They proposed an architecture to achieve the MLS property based on MSL concept.…”
Section: Related Workmentioning
confidence: 99%
“…Therefore, the relay can be partly malicious in the sense that it still functions in compliance with the relaying protocol, whilst it leaks secret information. Another application is the multiple level access control in wireless sensor networks, where sensors have different authorizations and sensitivities depending on their roles and collected data [25][26][27][28]. In such setups, the relaying node might be only allowed to help forwarding messages from one terminal to another, as not all terminals have direct access to other members in the sensor group.…”
Section: Introductionmentioning
confidence: 99%
“…Another essential requirement of an ECC implementation for WSNs is to support curves of different order (i.e. different cryptographic "strength") since the various tasks a sensor node performs during its lifetime have very different security needs [30,22]. For example, a multi-tier security framework for WSNs can permit lower security levels (i.e.…”
Section: Introductionmentioning
confidence: 99%