Privacy and security in wireless sensor networks: protocols, algorithms, and efficient architectures
Hindawi Publishing Corporation, 2013
Online
Buch
Zugriff:
In the last years, Wireless Sensor Networks (WSNs) experienced a rapid growth with a huge interest from both academia and industry. Besides communication services, their applications include environmental monitoring, surveillance, logistics and process control in industrial scenarios, local and home area networks for health, assistance of elderly and disabled people, energy saving, smart homes, and/or smart city services. The widespread deployment of WSN nodes and their interconnection through personal, local, or metropolitan area networks pose several challenges in terms of privacy and security of the network and of the access to data. Moreover, some of the possible applications of WSN have stringent security issues. Notwithstanding, this is only a part of the problem: the nodes of a WSN have limited resources in terms of computational and storage capability and have strict constraints in terms of compact size, low-power consumption, and power management. Therefore, new models, protocols, and advanced architectures for WSN have to be devised. In the aforementioned context, the article by I. Coisel and T. Martin addresses the privacy concerns derived from the rise of wireless applications based on Radio Frequency Identification (RFID) technology. Indeed, nowadays when such an application is deployed, informed customers yearn for guarantees that their privacy will not be threatened. One formal way to perform this task is to assess the privacy level of the RFID application with a model. However, if the chosen model does not reflect the assumptions and requirements of the analyzed application, it may misevaluate its privacy level. Selecting the most appropriate model among all the existing ones is not an easy task. To this end, the article by I. Coisel and T. Martin investigates the eight most well-known RFID privacy models and thoroughly examines their advantages and drawbacks in three steps. Firstly, five RFID authentication protocols are analyzed with these models. This discloses a main worry: although these ...
Titel: |
Privacy and security in wireless sensor networks: protocols, algorithms, and efficient architectures
|
---|---|
Autor/in / Beteiligte Person: | Saponara, Sergio ; Solanas, Agusti ; Neri, Bruno ; Avoine, Gildas ; UCL - SST/ICTM/INGI - Pôle en ingénierie informatique |
Link: | |
Veröffentlichung: | Hindawi Publishing Corporation, 2013 |
Medientyp: | Buch |
DOI: | 10.1155/2013/528750 |
Schlagwort: |
|
Sonstiges: |
|