IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Modeling a Secure Sensor Network Using an Extended Elementary Object System

Modeling a Secure Sensor Network Using an Extended Elementary Object System
View Sample PDF
Author(s): Vineela Devarashetty (University of Illinois at Chicago, USA), Jeffrey J.P. Tsai (University of Illinois at Chicago, USA), Lu Ma (University of Illinois at Chicago, USA)and Du Zhang (California State University at Sacramento, USA)
Copyright: 2012
Pages: 16
Source title: Developments in Natural Intelligence Research and Knowledge Engineering: Advancing Applications
Source Author(s)/Editor(s): Yingxu Wang (University of Calgary, Canada)
DOI: 10.4018/978-1-4666-1743-8.ch018

Purchase

View Modeling a Secure Sensor Network Using an Extended Elementary Object System on the publisher's website for pricing and purchasing information.

Abstract

A sensor network consists of a large number of sensor nodes, which are spread over a geographical area. Sensor networks have found their way into many applications, from military domains to traffic or environmental monitoring, and as sensor networks reach toward wide spread deployment, security becomes a major concern. In this regard, one needs to be sure about the confidentiality, authenticity and tamper-proof of data. The research thus far has focused on how to deploy sensor networks so that they can work efficiently; however, the focus of this paper is on sensor networks’ security issues. In this paper, the authors propose a formal model to design and analyze the secure sensor network system. The model is based on an augmented Petri net formalism called Extended Elementary Object System. This proposed secure sensor network model has a multi-layered structure consisting of sink node layer, sensor node layer and security mechanism layer. At the security mechanism layer, a synchronous firing mechanism is utilized as a security measure to detect malicious node attacks to sensor data and information flow. In addition, the model applies SNEP protocol for authentication and confidentiality of sensor data.

Related Content

Hemalatha J. J., Bala Subramanian Chokkalingam, Vivek V., Sekar Mohan. © 2023. 14 pages.
R. Muthuselvi, G. Nirmala. © 2023. 12 pages.
Jerritta Selvaraj, Arun Sahayadhas. © 2023. 16 pages.
Vidhya R., Sandhia G. K., Jansi K. R., Nagadevi S., Jeya R.. © 2023. 8 pages.
Shanthalakshmi Revathy J., Uma Maheswari N., Sasikala S.. © 2023. 13 pages.
Uma N. Dulhare, Shaik Rasool. © 2023. 29 pages.
R. Nareshkumar, G. Suseela, K. Nimala, G. Niranjana. © 2023. 22 pages.
Body Bottom