ISSN : 1796-2056
Volume : 3    Issue : 1    Date : January 2008

Securing Wireless Sensor Networks: Security Architectures
David Boyle and Thomas Newe
Page(s): 65-77
Full Text:
PDF (416 KB)

Wireless sensor networking remains one of the most exciting and challenging research domains of
our time. As technology progresses, so do the capabilities of sensor networks. Limited only by what
can be technologically sensed, it is envisaged that wireless sensor networks will play an important
part in our daily lives in the foreseeable future. Privy to many types of sensitive information, both
sensed and disseminated, there is a critical need for security in a number of applications related to
this technology. Resulting from the continuous debate over the most effective means of securing
wireless sensor networks, this paper considers a number of the security architectures employed,
and proposed, to date, with this goal in sight. They are presented such that the various
characteristics of each protocol are easily identifiable to potential network designers, allowing a
more informed decision to be made when implementing a security protocol for their intended
application. Authentication is the primary focus, as the most malicious attacks on a network are the
work of imposters, such as DOS attacks, packet insertion etc. Authentication can be defined as a
security mechanism, whereby, the identity of a node in the network can be identified as a valid node
of the network. Subsequently, data authenticity can be achieved; once the integrity of the message
sender/receiver has been established.

Index Terms
Wireless Sensor Networks, Security, Authentication, Cryptography