A Regulation-Based Security Evaluation Method for Data Link in Wireless Sensor Network
This article presents a novel approach to the analysis of wireless sensor networks (WSN) security, based on the regulations intended for wireless communication devices. Starting from the analysis and classification of attacks, countermeasures, and available protocols, we present the current state on...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi Limited
2014-01-01
|
Series: | Journal of Computer Networks and Communications |
Online Access: | http://dx.doi.org/10.1155/2014/591920 |
id |
doaj-3fc580ddfb8c42df9bd68c6cdc972ecf |
---|---|
record_format |
Article |
spelling |
doaj-3fc580ddfb8c42df9bd68c6cdc972ecf2020-11-25T01:05:11ZengHindawi LimitedJournal of Computer Networks and Communications2090-71412090-715X2014-01-01201410.1155/2014/591920591920A Regulation-Based Security Evaluation Method for Data Link in Wireless Sensor NetworkClaudio S. Malavenda0F. Menichelli1M. Olivieri2Selex ES, Via Tiburtina Km 12,400, 00131 Rome, ItalySapienza University of Rome, Via Eudossiana 18, 00184 Rome, ItalySapienza University of Rome, Via Eudossiana 18, 00184 Rome, ItalyThis article presents a novel approach to the analysis of wireless sensor networks (WSN) security, based on the regulations intended for wireless communication devices. Starting from the analysis and classification of attacks, countermeasures, and available protocols, we present the current state on secure communication stacks for embedded systems. The regulation analysis is based on civil EN 50150 and MIL STD-188-220, both applicable to WSN communications. Afterwards, starting from a list of known WSN attacks, we use a correspondence table to match WSN attacks with countermeasures required by regulations. This approach allows us to produce a precise security evaluation and classification methodology for WSN protocols. The results show that current protocols do not present a complete coverage of security issues. While this conclusion is already known for many WSN protocols, to the best of our knowledge this is the first time a complete methodology is proposed to base this assertion. Moreover, by using the proposed methodology, we are able to precisely identify the exposed threats for each WSN protocol under analysis.http://dx.doi.org/10.1155/2014/591920 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Claudio S. Malavenda F. Menichelli M. Olivieri |
spellingShingle |
Claudio S. Malavenda F. Menichelli M. Olivieri A Regulation-Based Security Evaluation Method for Data Link in Wireless Sensor Network Journal of Computer Networks and Communications |
author_facet |
Claudio S. Malavenda F. Menichelli M. Olivieri |
author_sort |
Claudio S. Malavenda |
title |
A Regulation-Based Security Evaluation Method for Data Link in Wireless Sensor Network |
title_short |
A Regulation-Based Security Evaluation Method for Data Link in Wireless Sensor Network |
title_full |
A Regulation-Based Security Evaluation Method for Data Link in Wireless Sensor Network |
title_fullStr |
A Regulation-Based Security Evaluation Method for Data Link in Wireless Sensor Network |
title_full_unstemmed |
A Regulation-Based Security Evaluation Method for Data Link in Wireless Sensor Network |
title_sort |
regulation-based security evaluation method for data link in wireless sensor network |
publisher |
Hindawi Limited |
series |
Journal of Computer Networks and Communications |
issn |
2090-7141 2090-715X |
publishDate |
2014-01-01 |
description |
This article presents a novel approach to the analysis of wireless sensor networks (WSN) security, based on the regulations intended for wireless communication devices. Starting from the analysis and classification of attacks, countermeasures, and available protocols, we present the current state on secure communication stacks for embedded systems. The regulation analysis is based on civil EN 50150 and MIL STD-188-220, both applicable to WSN communications. Afterwards, starting from a list of known WSN attacks, we use a correspondence table to match WSN attacks with countermeasures required by regulations. This approach allows us to produce a precise security evaluation and classification methodology for WSN protocols. The results show that current protocols do not present a complete coverage of security issues. While this conclusion is already known for many WSN protocols, to the best of our knowledge this is the first time a complete methodology is proposed to base this assertion. Moreover, by using the proposed methodology, we are able to precisely identify the exposed threats for each WSN protocol under analysis. |
url |
http://dx.doi.org/10.1155/2014/591920 |
work_keys_str_mv |
AT claudiosmalavenda aregulationbasedsecurityevaluationmethodfordatalinkinwirelesssensornetwork AT fmenichelli aregulationbasedsecurityevaluationmethodfordatalinkinwirelesssensornetwork AT molivieri aregulationbasedsecurityevaluationmethodfordatalinkinwirelesssensornetwork AT claudiosmalavenda regulationbasedsecurityevaluationmethodfordatalinkinwirelesssensornetwork AT fmenichelli regulationbasedsecurityevaluationmethodfordatalinkinwirelesssensornetwork AT molivieri regulationbasedsecurityevaluationmethodfordatalinkinwirelesssensornetwork |
_version_ |
1725195811353001984 |