Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Information Security

James Madison University

Articles 1 - 1 of 1

Full-Text Articles in Computer Engineering

Investigating Security Attacks On Wireless Sensor Networks (Wsns) Via An Iot Environmental Monitoring System, Mauricio Tellez Nava, Samy El-Tawab, M. Hossain Heydari Apr 2016

Investigating Security Attacks On Wireless Sensor Networks (Wsns) Via An Iot Environmental Monitoring System, Mauricio Tellez Nava, Samy El-Tawab, M. Hossain Heydari

Showcase of Graduate Student Scholarship and Creative Activities

To demonstrate our work, we have implemented a secure temperature monitoring system that makes use of the IEEE 802.15.4 standard, AES-128 hardware encryption and TelosB sensor nodes. In our design, we consider one of the nodes to be a coordinator node, which plays the role of a central node that establishes network association requests, listens for incoming packets, decrypts the incoming packets and forwards any received packets to the monitoring device. Three other nodes act as end-devices, which play the role of collecting temperature measurements, encrypting the collected data and sending the encrypted packets to the coordinator node. A last …