Coordination middleware for secure wireless sensor networks

Yuuichi Nakamura, Maxime Louvel, Hiroaki Nishi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)


Wireless sensor networks (WSNs) are implemented in various Internet-of-Things applications such as energy management systems. As the applications may involve personal information, they must be protected from attackers attempting to read information or control network devices. Research on WSN security is essential to protect WSNs from attacks. Studies in such research domains propose solutions against the attacks. However, they focus mainly on the security measures rather than on their ease in implementation in WSNs. In this paper, we propose a coordination middleware that provides an environment for constructing updatable WSNs for security. The middleware is based on LINC, a rule-based coordination middleware. The proposed approach allows the development of WSNs and attaches or detaches security modules when required. We implemented three security modules on LINC and on a real network, as case studies. Moreover, we evaluated the implementation costs while comparing the case studies.

Original languageEnglish
Title of host publicationProceedings of the IECON 2016 - 42nd Annual Conference of the Industrial Electronics Society
PublisherIEEE Computer Society
Number of pages6
ISBN (Electronic)9781509034741
Publication statusPublished - 2016 Dec 21
Event42nd Conference of the Industrial Electronics Society, IECON 2016 - Florence, Italy
Duration: 2016 Oct 242016 Oct 27

Publication series

NameIECON Proceedings (Industrial Electronics Conference)


Other42nd Conference of the Industrial Electronics Society, IECON 2016


  • Cryptography
  • Middleware
  • Wireless Sensor Networks

ASJC Scopus subject areas

  • Control and Systems Engineering
  • Electrical and Electronic Engineering


Dive into the research topics of 'Coordination middleware for secure wireless sensor networks'. Together they form a unique fingerprint.

Cite this