Title :
Securing Wireless Sensor Networks Against Spurious Injections
Author :
Chowdhury, A.R. ; Tripathy, Somanath ; Nandi, Sukumar
Author_Institution :
Software Eng. & Technol. Labs, Infosys Technol. Ltd, Bangalore, India
Abstract :
Wireless sensor networks (WSNs) are best suited for perceiving a phenomenon, which in turn forms the basis for controlling an actuator in a corrective plane. However, before the corrective action can be invoked, it is necessary to validate that the data was not injected with a malicious intent. To this end we propose CADA (cellular automata based data authentication mechanism), a lightweight protocol to authenticate data from valid nodes. Unlike its predecessors, it is designed to assume scarcity of multiple resources viz power, processing, storage, bandwidth and radio range.CADA takes advantage of the concurrent operations in cellular automata components and is therefore not only fast but also easily realizable in hardware.
Keywords :
cellular automata; message authentication; protocols; telecommunication security; wireless sensor networks; actuator control; cellular automata based data authentication protocol; secure wireless sensor network; spurious injection; Actuators; Bandwidth; Data security; Flash memory; Hardware; Open source software; Sensor phenomena and characterization; Telecommunication traffic; Wireless communication; Wireless sensor networks;
Conference_Titel :
Communication Systems Software and Middleware, 2007. COMSWARE 2007. 2nd International Conference on
Conference_Location :
Bangalore
Print_ISBN :
1-4244-0613-7
DOI :
10.1109/COMSWA.2007.382600