Title
A policy based security management architecture for sensor networks
Abstract
Wireless sensor networks are subjected to several types of attacks specially attacks of denial of service types (DoS). Several mechanisms and techniques were proposed to provide security to wireless sensor networks, like cryptographic process, key management protocols, intrusion detection systems, node revocation schemas, secure routing, and secure data fusion. A recent work proposes a security management framework to dynamically configure and reconfigure security components in sensor networks according to management information collected by sensor nodes and sent to decision-maker management entities. It turns on or off security components only when they are necessary, saving power and extend network lifetime. The architecture is policy based, what enable rules configuration specific for each application. We evaluate that security management framework, showing possibilities to save power and how that work can contribute to extend network lifetime. We propose some scenarios to evaluate the performance of the security management framework and estimate the cost of security components.
Year
DOI
Venue
2009
10.1109/INM.2009.5188830
Integrated Network Management
Keywords
Field
DocType
security management architecture,security component,management information,key management protocol,sensor node,wireless sensor network,management entity,security management framework,sensor network,network lifetime,reconfigure security component,intrusion detection system,base stations,wireless application protocol,decision maker,security management,cryptographic protocols,routing protocols,cryptography,data fusion,information security,data security,routing,wireless sensor networks,sensor fusion,availability,denial of service,intrusion detection systems
Network security policy,Computer security,Computer science,Computer network,Security service,Security association,Cloud computing security,Security information and event management,Network Access Control,Computer security model,Security management
Conference
Citations 
PageRank 
References 
5
0.51
7
Authors
3
Name
Order
Citations
PageRank
Sérgio de Oliveira150.51
Thiago Rodrigues de Oliveira2272.62
Jose Marcos Nogueira3566.24