Access the full text.
Sign up today, get DeepDyve free for 14 days.
G. Kambourakis, Eleni Klaoudatou, S. Gritzalis (2007)
Securing Medical Sensor Environments: The CodeBlue Framework CaseThe Second International Conference on Availability, Reliability and Security (ARES'07)
2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗
Xiangqian Chen, K. Makki, K. Yen, N. Pissinou (2009)
Sensor network security: a surveyIEEE Communications Surveys & Tutorials, 11
P. Eronen, H. Tschofenig (2005)
Pre-Shared Key Ciphersuites for Transport Layer Security (TLS)RFC, 4279
J. Walters, Zhengqiang Liang, Weisong Shi, V. Chaudhary (2006)
Wireless Sensor Network Security: A Survey
M. Domingues, C. Friaças, P. Veiga (2007)
Is global IPv6 deployment on track?Internet Res., 17
Torsten Braun, T. Voigt, A. Dunkels (2007)
TCP support for sensor networks2007 Fourth Annual Conference on Wireless on Demand Network Systems and Services
T. Dierks, E. Rescorla (2008)
The Transport Layer Security (TLS) Protocol Version 1.2RFC, 5246
T. Dierks, E. Rescorla
RFC 4346: the transport layer security (TLS) protocol version 1.1
Yee Law, J. Doumen, P. Hartel (2006)
Survey and benchmark of block ciphers for wireless sensor networksACM Trans. Sens. Networks, 2
M. Domingues, C. Friaças, P. Veiga (2007)
Is Global IPv 6 Deployment on Track ?
T. Luckenbach, P. Gober, S. Arbanowski, A. Kotsopoulos, K. Kim (2005)
TinyREST – a Protocol for Integrating Sensor Networks into the Internet
G. Montenegro, N. Kushalnagar, J. Hui, D. Culler
RFC 4944: transmission of IPv6 packets over IEEE 802.15.4 networks
B. Priyantha, A. Kansal, M. Goraczko, Feng Zhao (2008)
Tiny Web Services for Sensor Device Interoperability2008 International Conference on Information Processing in Sensor Networks (ipsn 2008)
R. Román, Javier López, S. Gritzalis (2008)
Situation awareness mechanisms for wireless sensor networksIEEE Communications Magazine, 46
M. Kosanovic, M. Stojcev (2007)
Implementation of TCP / IP Protocols in Wireless Sensor Networks
C. Neuman, Tom Yu, S. Hartman, Kenneth Raeburn (1993)
The Kerberos Network Authentication Service (V5)RFC, 1510
G. Montenegro, Nandakishore Kushalnagar, J. Hui, D. Culler (2007)
Transmission of IPv6 Packets over IEEE 802.15.4 NetworksRFC, 4944
A. Liu, P. Ning
TinyECC: a configurable library for elliptic curve cryptography in wireless sensor networks
(2008)
KMS CRISIS Guidelines Web Application
P. Eronen, H. Tschofenig
RFC 4279: pre‐shared key ciphersuites for transport layer security (TLS)
A. Kansal, Suman Nath, Jie Liu, Feng Zhao (2007)
SenseWeb: An Infrastructure for Shared SensingIEEE MultiMedia, 14
(2006)
From Smart Devices to Ambient Communication ”
Robert Dickerson, Jiakang Lu, Jian Lu, K. Whitehouse (2008)
Stream Feeds - An Abstraction for the World Wide Sensor Web
Vipul Gupta, M. Wurm, Y. Zhu, Matthew Millard, Stephen Fung, N. Gura, H. Eberle, S. Shantz (2005)
Sizzle: a standards-based end-to-end security architecture for the embedded InternetThird IEEE International Conference on Pervasive Computing and Communications
(2005)
Extending the Internet Architecture to Sensor Networks : Some Open Questions ”
C. Neuman, T. Yu, S. Hartman, K. Raeburn
RFC 4129: the Kerberos network authentication service (V5)
ISA
ISA100.11a, release 1
K. Choi, Jong-In Song (2006)
Investigation of feasible cryptographic algorithms for wireless sensor network2006 8th International Conference Advanced Communication Technology, 2
(2007)
OASIS Standard: WSSecureConversation 1.3
J. Lees, Jeffrey Johnson, M. Ruiz, L. Troncoso, M. Welsh (2008)
Reventador Volcano 2005 : Eruptive activity inferred from seismo-acoustic observationJournal of Volcanology and Geothermal Research, 176
Sensinode Ltd.
Nanostack, a 6lowpan implementation
Nandakishore Kushalnagar, G. Montenegro, Christian Schumacher (2007)
IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and GoalsRFC, 4919
Purpose – This paper aims to analyze the security issues that arise when integrating wireless sensor networks (WSN) and the internet. Also, it seeks to review whether existing technology mechanisms are suitable and can be applied in this context. Design/methodology/approach – The paper considers the possible approaches that can be used to connect a WSN with the internet, and analyzes the security of their interactions. Findings – By providing the services of the network through a front‐end proxy, a sensor network and the internet can interact securely. There are other challenges to be solved if the sensor nodes are integrated into the internet infrastructure, although there exists interesting advances on his matter. Research limitations/implications – The complete integration of sensor networks and the internet still remains as an open issue. Practical implications – With the current state of the art, it is possible to develop a secure sensor network that can provide its services to internet hosts with certain security properties. Originality/value – The paper studies the interactions between sensor networks and the internet from the point of view of security. It identifies both solutions and research challenges.
Internet Research – Emerald Publishing
Published: Apr 3, 2009
Keywords: Computer networks; Wireless; Data security; Integration; Internet
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.