Abstract
Wireless sensor networks (WSN) are rapidly expanding their attractiveness in both military and civilian applications, imposing the need for effective security strategies/mechanisms. In this paper we considered that a new phase (self-destruction) must be included as a final stage in the WSN lifecycle in order to assure the confidentiality regarding information like: network topology, type of measurement data gathered by sensors, encryption/ authentication algorithms and key-exchange mechanisms, etc. that can be unveiled through reverse engineering methods. Moreover, we presented a new procedure that implements this new lifecycle phase on a cluster-tree network topology.
| Original language | English |
|---|---|
| Pages | 63-67 |
| Number of pages | 5 |
| State | Published - 2009 |
| Event | ICETE 2009 - International Joint Conference on e-Business and Telecommunications - Milan, Italy Duration: Jul 7 2009 → Jul 10 2009 |
Conference
| Conference | ICETE 2009 - International Joint Conference on e-Business and Telecommunications |
|---|---|
| Country/Territory | Italy |
| City | Milan |
| Period | 07/7/09 → 07/10/09 |
Keywords
- Cluster-tree topology
- Self-destruction
- Wireless sensor networks
Fingerprint
Dive into the research topics of 'Self-destruction procedure for cluster-tree wireless sensor networks'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver