Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

A monitoring-based approach for WSN security using IEEE-802.15.4/6LowPAN and DTLS communication

A monitoring-based approach for WSN security using IEEE-802.15.4/6LowPAN and DTLS communication In this paper, we present a monitoring-based approach for securing upper layer communications of wireless sensor networks (WSN), the latter using IEEE802.15.4/6LoWPAN stacks and tinyDTLS. The monitoring techniques have been integrated as an extension to the industrial tool Montimage monitoring tool (MMT). The MMT-extension verifies that the network is working following a set of security rules that have been defined by ETSI. The security rules check if the protocol stack is working properly. If MMT detects a security rule that was not respected, then it sends an alarm to the system manager so that he can take properly reactive adjustments. We tested each of the security rules in MMT's extension using point-to-point configuration. After all these tests were verified, we tested our MMT-extension using real data gathered from the FIT IoT-LAB platform. The results of these tests shown that our MMT's extension for WSN using IEEE-802.15.4/6LowPAN and DTLS communication is feasible. http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png International Journal of Autonomous and Adaptive Communications Systems Inderscience Publishers

Loading next page...
 
/lp/inderscience-publishers/a-monitoring-based-approach-for-wsn-security-using-ieee-802-15-4-qWCf9ecHr3
Publisher
Inderscience Publishers
Copyright
Copyright © Inderscience Enterprises Ltd
ISSN
1754-8632
eISSN
1754-8640
DOI
10.1504/IJAACS.2019.100754
Publisher site
See Article on Publisher Site

Abstract

In this paper, we present a monitoring-based approach for securing upper layer communications of wireless sensor networks (WSN), the latter using IEEE802.15.4/6LoWPAN stacks and tinyDTLS. The monitoring techniques have been integrated as an extension to the industrial tool Montimage monitoring tool (MMT). The MMT-extension verifies that the network is working following a set of security rules that have been defined by ETSI. The security rules check if the protocol stack is working properly. If MMT detects a security rule that was not respected, then it sends an alarm to the system manager so that he can take properly reactive adjustments. We tested each of the security rules in MMT's extension using point-to-point configuration. After all these tests were verified, we tested our MMT-extension using real data gathered from the FIT IoT-LAB platform. The results of these tests shown that our MMT's extension for WSN using IEEE-802.15.4/6LowPAN and DTLS communication is feasible.

Journal

International Journal of Autonomous and Adaptive Communications SystemsInderscience Publishers

Published: Jan 1, 2019

There are no references for this article.