دانلود رایگان مقاله انگلیسی یک اولویت برای WSN در محیط همه جا حاضر: الزامات امنیتی چند رسانه ای - اشپرینگر 2016

عنوان فارسی
یک اولویت برای WSN در محیط همه جا حاضر: الزامات امنیتی چند رسانه ای
عنوان انگلیسی
A priority for WSN in ubiquitous environment: multimedia security requirements
صفحات مقاله فارسی
0
صفحات مقاله انگلیسی
21
سال انتشار
2016
نشریه
اشپرینگر - Springer
فرمت مقاله انگلیسی
PDF
کد محصول
E7731
رشته های مرتبط با این مقاله
مهندسی فناوری اطلاعات
گرایش های مرتبط با این مقاله
شبکه های کامپیوتری، سیستم های چند رسانه ای، رایانش امن
مجله
ابزارهای چندرسانه ای و برنامه های کاربردی - Multimedia Tools and Applications
دانشگاه
Humanitas College - Kyung Hee University - Kyung Hee University 1 Hoegi-dong - South Korea
کلمات کلیدی
شبکه های حسگر بی سیم، محيط انسانی محور، محاسبات فراگیر، ویژگی های امنیتی چندرسانه ای، الزامات امنیتی چندرسانه ای، اولویت نسبی، روند سلسله مراتب تحلیلی
چکیده

Abstract


With the rapid expansion of the human-centric ubiquitous environment, wireless sensor networks (WSN) will continue to be part of our everyday life and increase the amount and the type of data generated and transmitted by the WSN. As sensors become more essential in our daily life, the data from the sensors will become more private and need to be handled more sensitively. Therefore, the security of not only the data transmission between sensor nodes, but also the software system handling the data from sensor nodes will become more important. In this study, I concentrated on the security characteristics of the overall application systems in WSNs and derived the security attributes from the security requirements and standards of the existing network-based software systems. In the software development process, security must be considered throughout the whole process and, according to the applications the priority of each security attribute can be changed. I demonstrated the relative priority change in a web-based system and a WSN application system with an Analytic Hierarchy Process. The evaluation results showed that the difference of the relative priority of the security attributes in each sample system results not from the difference between the existing network-based system and the WSN but the type of the application. Therefore, the Multimedia security requirements and standards of the existing network-based software development process can be applied to the WSN application system through proper selection and modification.

نتیجه گیری

5 Conclusion and discussions


Wireless sensor networks will continue to be part of our everyday life and their applications and importance will increase. As sensors become smaller size and higher performance, data from the sensors become much greater, more diversified as well as being generated more quickly. Also, when WSN is applied to human-centric ubiquitous environments, the data will be more private and need to be protected more thoroughly. Therefore, the multimedia security of not only the data transmission between sensor nodes, but also the software system handling the data from sensor nodes will be more important.


In many cases up to now, the security concerns of WSNs are focused on the cryptography techniques between nodes. In this study, I concentrated on the multimedia security characteristics of the overall application systems in WSN and derived the multimedia security attributes from the security requirements and attributes of the existing network-based software systems.


However, in the software development process, multimedia security must be considered through the whole process and, according to applications the priority of each multimedia security attribute can be changed. To allot the limited resources such as time, cost, human the relative priority of the multimedia security attribute must be estimated objectively. AHP is an appropriate technique to decide the relative priority between various multimedia security factors. I demonstrated the relative priority change in a network-based system and a WSN application system with AHP. The difference of the relative priority of the security attributes in each sample system results not from the difference between the existing network-based system and the WSN, but the type of application. Therefore, the multimedia security requirements and standards of the existing network-based software development process can be applied to the WSN application system through proper selection and modification.


I believe this study will be useful to help decide multimedia security attributes and evaluate their priorities in the WSN system development process for a variety of WSN applications. In future study by applying the proposed method to more various WSN systems the effectiveness will be verified.


بدون دیدگاه