Secure and efficient automatic ruling in three-level network architecture

Pawani Porambage, An Braeken, Matthias Carlier, Pardeep Kumar, Andrei Gurtov, Mika Ylianttila

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

Abstract

Wireless sensor and actuator networks (WSANs) allow intelligent healthcare for homecare environments in ambient assisted living (AAL) systems. Typically, WSANs are constrained networks deployed in three-level network architectures with a central server and several intermediate edge routers. A protocol and system are proposed in this paper for creating rules that can enforce application-layer semantics, both at a central server and at edge routers. With this system in place, multicasting wireless networks would be able to filter messages more efficiently, preserving network and node resources. Rules are implemented by means of the Constrained Application Protocol (CoAP) resources of the nodes, placed in an IPv6 over Low power Wireless Personal Area Network (6LoWPAN). Moreover, we discuss the applicability of the proposed solution by a performance and a security analysis.

Original languageEnglish
Title of host publicationAdvances in Intelligent Systems and Computing
Pages185-194
Number of pages10
Volume399
ISBN (Electronic)9783319257334
DOIs
Publication statusPublished - 2016
MoE publication typeA4 Article in a conference publication
EventInternational Conference on Information and Communication Technologies - Ohrid, Macedonia, The Former Yugoslav Republic of
Duration: 1 Oct 20154 Oct 2015
Conference number: 7

Publication series

NameAdvances in Intelligent Systems and Computing
Volume399
ISSN (Print)21945357

Conference

ConferenceInternational Conference on Information and Communication Technologies
Abbreviated titleICT
CountryMacedonia, The Former Yugoslav Republic of
CityOhrid
Period01/10/201504/10/2015

Keywords

  • Constrained Application Protocol
  • Key management
  • Wireless sensor and actuator networks

Fingerprint Dive into the research topics of 'Secure and efficient automatic ruling in three-level network architecture'. Together they form a unique fingerprint.

Cite this