Skip to main content

Secure Self Organization of Wireless Sensor Network: A Need Based Approach Using Certificate Less Public Key Infrastructure

  • Conference paper
Computer Networks and Information Technologies (CNC 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 142))

  • 1270 Accesses

Abstract

Wireless Sensor Network (WSN) is envisioned as a static ad hoc network. Sensor Nodes in this type of network needs to self organize themselves. During self organization sensor nodes initially discovers themselves and then joins the network. Security plays an important role when a new node joins the WSN. Only the authorized nodes should be allowed to join. However, security comes with a cost and same level of security may not be required always. Hence authors propose an approach to secure self-organization of WSN with need based security in this paper.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.: SPINS: Security Protocols for Sensor Networks Mobile Computing and Networking (2001)

    Google Scholar 

  2. Stein, D.J., Esq: Wireless Sensor Network Simulator v1.1 (2005)

    Google Scholar 

  3. Weimin, L., Zongkai, Y., Wenqing, C., Yunmeng, T.: Research on the Security in Wireless Sensor Network. Asian Journal of Information Technology 5(3), 339–345 (2006)

    Google Scholar 

  4. Westoff, D., Girao, J., Sarma, J.: Security Solutions for Wireless Sensor Networks Special Issue: Dependable IT and Network Technology (2006)

    Google Scholar 

  5. Saxena, M.: Security in Wireless Sensor Networks- A Layer based Classification Purdue University, West Lafayette, IN 47907-2086 (2007)

    Google Scholar 

  6. Jung, W., Hong, S., Ha, M., Kim, Y.-J., Kim, D.: SSL-based Lightweight Security of IP-based Wireless Sensor Networks (2007)

    Google Scholar 

  7. Amin, F., Jahangir, A.H., Rasifard, H.: Analysis of Public-Key Cryptography for Wireless Sensor Networks Security World Academy of Science. Engineering and Technology 41 (2008)

    Google Scholar 

  8. Haque, M.M., Pathan, A.-S.K., Hong, C.S., Huh, E.-N.: An Asymmetric Key-Based Security Architecture for Wireless Sensor Networks (2008)

    Google Scholar 

  9. Soderman, P.: An Analysis of WSN Security Managemant School of Computer Science and Engineering. Royal Institute of Technology (2008)

    Google Scholar 

  10. Hu, W., Corke, P., Shih, W.C., Overs, L.: secFleck: A Public Key Technology Platform for Wireless Sensor Networks (2009)

    Google Scholar 

  11. Lukas, G., Fackroth, C.: WMNSec Security for Wireless Mesh Networks. In: IWCMC 2009, Leipzig, Germany (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kalita, H.K., Kar, A. (2011). Secure Self Organization of Wireless Sensor Network: A Need Based Approach Using Certificate Less Public Key Infrastructure. In: Das, V.V., Stephen, J., Chaba, Y. (eds) Computer Networks and Information Technologies. CNC 2011. Communications in Computer and Information Science, vol 142. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-19542-6_31

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-19542-6_31

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-19541-9

  • Online ISBN: 978-3-642-19542-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics