dc.contributor.author |
Pritchard, SW
|
|
dc.contributor.author |
Hancke, GP
|
|
dc.contributor.author |
Abu-Mahfouz, Adnan MI
|
|
dc.date.accessioned |
2018-10-01T10:14:10Z |
|
dc.date.available |
2018-10-01T10:14:10Z |
|
dc.date.issued |
2018-06 |
|
dc.identifier.citation |
Pritchard, S.W., Hancke, G.P. and Abu-Mahfouz, A.M.I. 2018. Cryptography methods for software-defined wireless sensor networks. 27th International Symposium on Industrial Electronics (ISIE), Cairns, Australia,13-15 June 2018 |
en_US |
dc.identifier.isbn |
978-1-5386-3705-0 |
|
dc.identifier.isbn |
978-1-5386-3704-3 |
|
dc.identifier.uri |
https://ieeexplore.ieee.org/document/8433630
|
|
dc.identifier.uri |
DOI: 10.1109/ISIE.2018.8433630
|
|
dc.identifier.uri |
http://hdl.handle.net/10204/10433
|
|
dc.description |
Copyright: 2018 IEEE. Due to copyright restrictions, the attached PDF file contains the accepted version of the published paper. For access to the published item, please consult the publisher's website, at https://ieeexplore.ieee.org/document/8433630 |
en_US |
dc.description.abstract |
The Software-Defined Wireless Sensor Networking (SDWSN) paradigm aims to solve inherent issues present in Wireless Sensor Networks (WSN), such as resource constraints, by adopting a Software-Defined Networking (SDN) approach to the management of these WSNs. The security aspect of SDWSN has received little attention due to a focus on the architecture. As this paradigm is a combination of both WSN and SDN, some solutions from both paradigms can be adapted to consider SDWSN. One of the main problems with implementing security within WSN, lies within its inherent issues, such as resource constraints. However, due to the centralization of control brought about by the SDN paradigm, most of these issues are alleviated, leaving room for WSN security implementations. In order to investigate the use of WSN cryptography within SDWSN, cryptography methods have been implemented within a SDWSN network in order to verify whether the SDWSN paradigm does allow for resource intense WSN security implementations. |
en_US |
dc.language.iso |
en |
en_US |
dc.publisher |
IEEE |
en_US |
dc.relation.ispartofseries |
Worklist;21365 |
|
dc.subject |
Security |
en_US |
dc.subject |
Security threats |
en_US |
dc.subject |
Software-Defined Networking |
en_US |
dc.subject |
SDN |
en_US |
dc.subject |
Software-Defined Wireless Sensor Networking |
en_US |
dc.subject |
SDWSN |
en_US |
dc.subject |
Wireless Sensor Networks |
en_US |
dc.subject |
WSN |
en_US |
dc.title |
Cryptography methods for software-defined wireless sensor networks |
en_US |
dc.type |
Conference Presentation |
en_US |
dc.identifier.apacitation |
Pritchard, S., Hancke, G., & Abu-Mahfouz, A. M. (2018). Cryptography methods for software-defined wireless sensor networks. IEEE. http://hdl.handle.net/10204/10433 |
en_ZA |
dc.identifier.chicagocitation |
Pritchard, SW, GP Hancke, and Adnan MI Abu-Mahfouz. "Cryptography methods for software-defined wireless sensor networks." (2018): http://hdl.handle.net/10204/10433 |
en_ZA |
dc.identifier.vancouvercitation |
Pritchard S, Hancke G, Abu-Mahfouz AM, Cryptography methods for software-defined wireless sensor networks; IEEE; 2018. http://hdl.handle.net/10204/10433 . |
en_ZA |
dc.identifier.ris |
TY - Conference Presentation
AU - Pritchard, SW
AU - Hancke, GP
AU - Abu-Mahfouz, Adnan MI
AB - The Software-Defined Wireless Sensor Networking (SDWSN) paradigm aims to solve inherent issues present in Wireless Sensor Networks (WSN), such as resource constraints, by adopting a Software-Defined Networking (SDN) approach to the management of these WSNs. The security aspect of SDWSN has received little attention due to a focus on the architecture. As this paradigm is a combination of both WSN and SDN, some solutions from both paradigms can be adapted to consider SDWSN. One of the main problems with implementing security within WSN, lies within its inherent issues, such as resource constraints. However, due to the centralization of control brought about by the SDN paradigm, most of these issues are alleviated, leaving room for WSN security implementations. In order to investigate the use of WSN cryptography within SDWSN, cryptography methods have been implemented within a SDWSN network in order to verify whether the SDWSN paradigm does allow for resource intense WSN security implementations.
DA - 2018-06
DB - ResearchSpace
DP - CSIR
KW - Security
KW - Security threats
KW - Software-Defined Networking
KW - SDN
KW - Software-Defined Wireless Sensor Networking
KW - SDWSN
KW - Wireless Sensor Networks
KW - WSN
LK - https://researchspace.csir.co.za
PY - 2018
SM - 978-1-5386-3705-0
SM - 978-1-5386-3704-3
T1 - Cryptography methods for software-defined wireless sensor networks
TI - Cryptography methods for software-defined wireless sensor networks
UR - http://hdl.handle.net/10204/10433
ER -
|
en_ZA |