About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
2nd International IEEE Conference on Communication System Software and Middleware

Research Article

Securing Wireless Sensor Networks Against Spurious Injections

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1109/COMSWA.2007.382600,
        author={ Atanu Roy Chowdhur and Somanath Tripath and Sukumar Nandi},
        title={Securing Wireless Sensor Networks Against Spurious Injections},
        proceedings={2nd International IEEE Conference on Communication System Software and Middleware},
        publisher={IEEE},
        proceedings_a={COMSWARE},
        year={2007},
        month={7},
        keywords={Actuators  Bandwidth  Data security  Flash memory  Hardware  Open source software  Sensor phenomena and characterization  Telecommunication traffic  Wireless communication  Wireless sensor networks},
        doi={10.1109/COMSWA.2007.382600}
    }
    
  • Atanu Roy Chowdhur
    Somanath Tripath
    Sukumar Nandi
    Year: 2007
    Securing Wireless Sensor Networks Against Spurious Injections
    COMSWARE
    IEEE
    DOI: 10.1109/COMSWA.2007.382600
Atanu Roy Chowdhur1,*, Somanath Tripath2,*, Sukumar Nandi2,*
  • 1: Software Engineering and Technology Lab, Infosys Technologies Ltd, Bangalore- 560100, India
  • 2: Department of Computer Science and Engineering, Indian Institute of Technology, Guwahati, North-Guwahati- 780139, Assam, India
*Contact email: atanu-chowdhury@infosys.co, som@iitg.ernet.in, sukumar@iitg.ernet.in

Abstract

Wireless sensor networks (WSNs) are best suited for perceiving a phenomenon, which in turn forms the basis for controlling an actuator in a corrective plane. However, before the corrective action can be invoked, it is necessary to validate that the data was not injected with a malicious intent. To this end we propose CADA (cellular automata based data authentication mechanism), a lightweight protocol to authenticate data from valid nodes. Unlike its predecessors, it is designed to assume scarcity of multiple resources viz power, processing, storage, bandwidth and radio range.CADA takes advantage of the concurrent operations in cellular automata components and is therefore not only fast but also easily realizable in hardware.

Keywords
Actuators Bandwidth Data security Flash memory Hardware Open source software Sensor phenomena and characterization Telecommunication traffic Wireless communication Wireless sensor networks
Published
2007-07-09
Publisher
IEEE
Modified
2011-07-25
http://dx.doi.org/10.1109/COMSWA.2007.382600
Copyright © 2007–2025 IEEE
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL