The integration between wireless Sensor Networks (WSN) and their server by the base station (BS) is an
important step in a variety of WSN applications. Adding different security methods is an important and essential
procedure to enhance the operation and safety of such integration. This paper focused on the design and
implementation challenges to localize an embedded security center into base station nodes which connects WSN to
the labview based automation system (server). The suggested base station security center consists of two ciphering
methods (AES & RC4) to provide data encryption to the whole path from the WSN nodes to the server, an HMAC
function to provide message integrity and authentication between the base station and the server, a keys generation
module, and a firewall. Our design takes into account the "embedded" nature of the base station (UBICOM IP2022
network processor chip in our case) and their limited resources and suggests different methods and protocols to achieve
its goals. The obtained results prove the possibility to insert firewall functionality in the system with minimum effect
of its normal operation.
الملخص الانجليزي
The integration between wireless Sensor Networks (WSN) and their server by the base station (BS) is an
important step in a variety of WSN applications. Adding different security methods is an important and essential
procedure to enhance the operation and safety of such integration. This paper focused on the design and
implementation challenges to localize an embedded security center into base station nodes which connects WSN to
the labview based automation system (server). The suggested base station security center consists of two ciphering
methods (AES & RC4) to provide data encryption to the whole path from the WSN nodes to the server, an HMAC
function to provide message integrity and authentication between the base station and the server, a keys generation
module, and a firewall. Our design takes into account the "embedded" nature of the base station (UBICOM IP2022
network processor chip in our case) and their limited resources and suggests different methods and protocols to achieve
its goals. The obtained results prove the possibility to insert firewall functionality in the system with minimum effect
of its normal operation.