WSNProtectLayer – security middleware for wireless sensor networks

Warning

This publication doesn't include Faculty of Economics and Administration. It includes Faculty of Informatics. Official publication website can be found on muni.cz.
Authors

MATYÁŠ Václav ŠVENDA Petr STETSKO Andriy KLINEC Dušan JURNEČKA Filip STEHLÍK Martin

Year of publication 2015
Type Chapter of a book
MU Faculty or unit

Faculty of Informatics

Citation
Description Our chapter will summarize the experimental development of the WSNProtectLayer – an open-source middleware for security and privacy support. This middleware, we believe, will decrease development time (for developers of end applications) and decrease a risk of design/code security errors. The second section of our proposed book chapter discusses the subsequent analysis of these scenarios. The analysis was necessary in order to better understand the security, privacy and functional requirements of the user applications. It helped to render the functionality of the developed platform. Section 3 describes the final architecture of WNSProtectLayer. It provides an overall picture of the architecture and also description of the major components – privacy, key distribution and intrusion detection, respectively. Section 4 contains brief information on the source codes of the WSNProtectLayer. It provides information on licensing and on repository with source codes. It also references the technical documentation. The designed architecture is implemented for widely used TinyOS operating system. Section 5 describes experiments conducted as a part of the design and development of the WSNProtectLayer platform. We have conducted several supporting experiments and tests of the partly of fully developed platform. The behaviour of the wireless radio transmission (packet loss ratio, communication range, speed of routing topology convergence) was examined during supporting experiments that were running in a time span of several days (CTP routing tree, RSSI radio signal propagation, jamming experiment). Based on the results of the experiments we set the default parameters of the platform. During more complex experiments, we evaluated behaviour of the whole platform. Section 6 concludes the chapter.
Related projects:

You are running an old browser version. We recommend updating your browser to its latest version.