DocumentCode :
3005506
Title :
Securing Wireless Sensor Networks Against Spurious Injections
Author :
Chowdhury, A.R. ; Tripathy, Somanath ; Nandi, Sukumar
Author_Institution :
Software Eng. & Technol. Labs, Infosys Technol. Ltd, Bangalore, India
fYear :
2007
fDate :
7-12 Jan. 2007
Firstpage :
1
Lastpage :
5
Abstract :
Wireless sensor networks (WSNs) are best suited for perceiving a phenomenon, which in turn forms the basis for controlling an actuator in a corrective plane. However, before the corrective action can be invoked, it is necessary to validate that the data was not injected with a malicious intent. To this end we propose CADA (cellular automata based data authentication mechanism), a lightweight protocol to authenticate data from valid nodes. Unlike its predecessors, it is designed to assume scarcity of multiple resources viz power, processing, storage, bandwidth and radio range.CADA takes advantage of the concurrent operations in cellular automata components and is therefore not only fast but also easily realizable in hardware.
Keywords :
cellular automata; message authentication; protocols; telecommunication security; wireless sensor networks; actuator control; cellular automata based data authentication protocol; secure wireless sensor network; spurious injection; Actuators; Bandwidth; Data security; Flash memory; Hardware; Open source software; Sensor phenomena and characterization; Telecommunication traffic; Wireless communication; Wireless sensor networks;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Communication Systems Software and Middleware, 2007. COMSWARE 2007. 2nd International Conference on
Conference_Location :
Bangalore
Print_ISBN :
1-4244-0613-7
Type :
conf
DOI :
10.1109/COMSWA.2007.382600
Filename :
4268024
Link To Document :
بازگشت