A Regulation-Based Security Evaluation Method for Data Link in Wireless Sensor Network

This article presents a novel approach to the analysis of wireless sensor networks (WSN) security, based on the regulations intended for wireless communication devices. Starting from the analysis and classification of attacks, countermeasures, and available protocols, we present the current state on...

Full description

Bibliographic Details
Main Authors: Claudio S. Malavenda, F. Menichelli, M. Olivieri
Format: Article
Language:English
Published: Hindawi Limited 2014-01-01
Series:Journal of Computer Networks and Communications
Online Access:http://dx.doi.org/10.1155/2014/591920
id doaj-3fc580ddfb8c42df9bd68c6cdc972ecf
record_format Article
spelling doaj-3fc580ddfb8c42df9bd68c6cdc972ecf2020-11-25T01:05:11ZengHindawi LimitedJournal of Computer Networks and Communications2090-71412090-715X2014-01-01201410.1155/2014/591920591920A Regulation-Based Security Evaluation Method for Data Link in Wireless Sensor NetworkClaudio S. Malavenda0F. Menichelli1M. Olivieri2Selex ES, Via Tiburtina Km 12,400, 00131 Rome, ItalySapienza University of Rome, Via Eudossiana 18, 00184 Rome, ItalySapienza University of Rome, Via Eudossiana 18, 00184 Rome, ItalyThis article presents a novel approach to the analysis of wireless sensor networks (WSN) security, based on the regulations intended for wireless communication devices. Starting from the analysis and classification of attacks, countermeasures, and available protocols, we present the current state on secure communication stacks for embedded systems. The regulation analysis is based on civil EN 50150 and MIL STD-188-220, both applicable to WSN communications. Afterwards, starting from a list of known WSN attacks, we use a correspondence table to match WSN attacks with countermeasures required by regulations. This approach allows us to produce a precise security evaluation and classification methodology for WSN protocols. The results show that current protocols do not present a complete coverage of security issues. While this conclusion is already known for many WSN protocols, to the best of our knowledge this is the first time a complete methodology is proposed to base this assertion. Moreover, by using the proposed methodology, we are able to precisely identify the exposed threats for each WSN protocol under analysis.http://dx.doi.org/10.1155/2014/591920
collection DOAJ
language English
format Article
sources DOAJ
author Claudio S. Malavenda
F. Menichelli
M. Olivieri
spellingShingle Claudio S. Malavenda
F. Menichelli
M. Olivieri
A Regulation-Based Security Evaluation Method for Data Link in Wireless Sensor Network
Journal of Computer Networks and Communications
author_facet Claudio S. Malavenda
F. Menichelli
M. Olivieri
author_sort Claudio S. Malavenda
title A Regulation-Based Security Evaluation Method for Data Link in Wireless Sensor Network
title_short A Regulation-Based Security Evaluation Method for Data Link in Wireless Sensor Network
title_full A Regulation-Based Security Evaluation Method for Data Link in Wireless Sensor Network
title_fullStr A Regulation-Based Security Evaluation Method for Data Link in Wireless Sensor Network
title_full_unstemmed A Regulation-Based Security Evaluation Method for Data Link in Wireless Sensor Network
title_sort regulation-based security evaluation method for data link in wireless sensor network
publisher Hindawi Limited
series Journal of Computer Networks and Communications
issn 2090-7141
2090-715X
publishDate 2014-01-01
description This article presents a novel approach to the analysis of wireless sensor networks (WSN) security, based on the regulations intended for wireless communication devices. Starting from the analysis and classification of attacks, countermeasures, and available protocols, we present the current state on secure communication stacks for embedded systems. The regulation analysis is based on civil EN 50150 and MIL STD-188-220, both applicable to WSN communications. Afterwards, starting from a list of known WSN attacks, we use a correspondence table to match WSN attacks with countermeasures required by regulations. This approach allows us to produce a precise security evaluation and classification methodology for WSN protocols. The results show that current protocols do not present a complete coverage of security issues. While this conclusion is already known for many WSN protocols, to the best of our knowledge this is the first time a complete methodology is proposed to base this assertion. Moreover, by using the proposed methodology, we are able to precisely identify the exposed threats for each WSN protocol under analysis.
url http://dx.doi.org/10.1155/2014/591920
work_keys_str_mv AT claudiosmalavenda aregulationbasedsecurityevaluationmethodfordatalinkinwirelesssensornetwork
AT fmenichelli aregulationbasedsecurityevaluationmethodfordatalinkinwirelesssensornetwork
AT molivieri aregulationbasedsecurityevaluationmethodfordatalinkinwirelesssensornetwork
AT claudiosmalavenda regulationbasedsecurityevaluationmethodfordatalinkinwirelesssensornetwork
AT fmenichelli regulationbasedsecurityevaluationmethodfordatalinkinwirelesssensornetwork
AT molivieri regulationbasedsecurityevaluationmethodfordatalinkinwirelesssensornetwork
_version_ 1725195811353001984