Integrating wireless sensor networks and the internet: a security analysis

Purpose – This paper aims to analyze the security issues that arise when integrating wireless sensor networks (WSN) and the internet. Also, it seeks to review whether existing technology mechanisms are suitable and can be applied in this context.Design/methodology/approach – The paper considers the possible approaches that can be used to connect a WSN with the internet, and analyzes the security of their interactions.Findings – By providing the services of the network through a front‐end proxy, a sensor network and the internet can interact securely. There are other challenges to be solved if the sensor nodes are integrated into the internet infrastructure, although there exists interesting advances on his matter.Research limitations/implications – The complete integration of sensor networks and the internet still remains as an open issue.Practical implications – With the current state of the art, it is possible to develop a secure sensor network that can provide its services to internet hosts with certai...

[1]  John T. Kohl,et al.  The Kerberos Network Authentication Service (V5 , 2004 .

[2]  David E. Culler,et al.  Transmission of IPv6 Packets over IEEE 802.15.4 Networks , 2007, RFC.

[3]  Georgios Kambourakis,et al.  Securing Medical Sensor Environments: The CodeBlue Framework Case , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).

[4]  Vipul Gupta,et al.  Sizzle: a standards-based end-to-end security architecture for the embedded Internet , 2005, Third IEEE International Conference on Pervasive Computing and Communications.

[5]  Mile K. Stojcev,et al.  Implementation of TCP / IP Protocols in Wireless Sensor Networks , 2007 .

[6]  Kamin Whitehouse,et al.  Stream Feeds - An Abstraction for the World Wide Sensor Web , 2008, IOT.

[7]  Eric Rescorla,et al.  The Transport Layer Security (TLS) Protocol Version 1.1 , 2006, RFC.

[8]  Matt Welsh,et al.  Reventador Volcano 2005 : Eruptive activity inferred from seismo-acoustic observation , 2008 .

[9]  Kang Yen,et al.  Sensor network security: a survey , 2009, IEEE Communications Surveys & Tutorials.

[10]  T. Braun,et al.  TCP support for sensor networks , 2007, 2007 Fourth Annual Conference on Wireless on Demand Network Systems and Services.

[11]  Carlos Friaças,et al.  Is global IPv6 deployment on track? , 2007, Internet Res..

[12]  Hannes Tschofenig,et al.  Pre-Shared Key Ciphersuites for Transport Layer Security (TLS) , 2005, RFC.

[13]  Suman Nath,et al.  SenseWeb: An Infrastructure for Shared Sensing , 2007, IEEE MultiMedia.

[14]  Stefanos Gritzalis,et al.  Situation awareness mechanisms for wireless sensor networks , 2008, IEEE Communications Magazine.

[15]  Weisong Shi,et al.  Wireless Sensor Network Security: A Survey , 2006 .

[16]  Gabriel Montenegro,et al.  IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and Goals , 2007, RFC.

[17]  Tim Dierks,et al.  The Transport Layer Security (TLS) Protocol Version 1.2 , 2008 .

[18]  T. Luckenbach,et al.  TinyREST – a Protocol for Integrating Sensor Networks into the Internet , 2005 .

[19]  Yee Wei Law,et al.  Survey and benchmark of block ciphers for wireless sensor networks , 2006, TOSN.

[20]  Feng Zhao,et al.  Tiny Web Services for Sensor Device Interoperability , 2008, 2008 International Conference on Information Processing in Sensor Networks (ipsn 2008).

[21]  Carlos Friaças,et al.  Is Global IPv 6 Deployment on Track ? , 2007 .

[22]  Kyung Jun Choi,et al.  Investigation of feasible cryptographic algorithms for wireless sensor network , 2006, 2006 8th International Conference Advanced Communication Technology.

[23]  Peng Ning,et al.  2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .