Journal of Computer and Communications

Volume 5, Issue 3 (March 2017)

ISSN Print: 2327-5219   ISSN Online: 2327-5227

Google-based Impact Factor: 1.12  Citations  

A Model of Security Adaptation for Limited Resources in Wireless Sensor Network

HTML  XML Download Download as PDF (Size: 606KB)  PP. 10-23  
DOI: 10.4236/jcc.2017.53002    1,552 Downloads   3,606 Views  Citations

ABSTRACT

View of wireless sensor network (WSN) devices is small but have exceptional functionality. Each node of a WSN must have the ability to compute and process data and to transmit and receive data. However, WSN nodes have limited resources in terms of battery capacity, CPU, memory, bandwidth, and data security. Memory limitations mean that WSN devices cannot store a lot of information, while CPU limitations make them operate slowly and limited battery capacity makes them operate for shorter periods of time. Moreover, the data gathered and processed by the network face real security threats. This article presents an Adaptable Resource and Security Framework (ARSy) that is able to adapt to the workload, security requirements, and available resources in a wireless sensor network. The workload adaptation is intended to preserve the resource availability of the WSN, while the security adaptation balances the level of security with the resource utilization. This solution makes resources available on the basis of the workload of the system and adjusts the level of security for resource savings and makes the WSN devices work more efficiently.

Share and Cite:

Parenreng, J. and Kitagawa, A. (2017) A Model of Security Adaptation for Limited Resources in Wireless Sensor Network. Journal of Computer and Communications, 5, 10-23. doi: 10.4236/jcc.2017.53002.

Cited by

[1] Secure routing protocol for wireless sensor networks: Survey
2022 8th International …, 2022
[2] Internet of Things-based cognitive wireless sensor networks: applications, merits, and demerits
… Sensors, Volume 1 …, 2022
[3] A Key Management Protocol for Heterogeneous Sensor Networks Based on Zero Trust Security and Chaotic Neural Networks
2022
[4] Security and application of wireless sensor network
2021
[5] Comparison of data-driven models for cleaning eHealth sensor data: Use case on ECG signal
Wireless personal communications, 2020
[6] Comparison of Data‑Driven Models for Cleaning eHealth Sensor Data: Use Case on ECG Signal
2020
[7] Data dissemination for Internet of vehicle based on 5G communications: A survey
2020
[8] Comparison of Data-Driven Models for Cleaning eHealth Sensor Data: Use Case on ECG Signal.
2020
[9] Practical adaptive security for resource-constrained IoT nodes
2020
[10] VRLA battery state of health estimation based on charging time
2019
[11] A Study of Limited Resources and Security Adaptation for Extreme Area in Wireless Sensor Networks
2019
[12] Trust model for wireless network security based on the edge computing
2019
[13] A Study of Limited Resources and Security Adaptation in Wireless Sensor Network
2018
[14] Resource Optimization Techniques and Security Levels for Wireless Sensor Networks Based on the ARSy Framework
Sensors, 2018
[15] HYBRIDIZATION OF ENHANCED ANT COLONY SYSTEM AND TABU SEARCH ALGORITHM FOR PACKET ROUTING IN WIRELESS SENSOR NETWORK

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.