2nd International IEEE Conference on Communication System Software and Middleware

Research Article

Securing Wireless Sensor Networks Against Spurious Injections

  • @INPROCEEDINGS{10.1109/COMSWA.2007.382600,
        author={ Atanu Roy Chowdhur and Somanath Tripath and Sukumar Nandi},
        title={Securing Wireless Sensor Networks Against Spurious Injections},
        proceedings={2nd International IEEE Conference on Communication System Software and Middleware},
        publisher={IEEE},
        proceedings_a={COMSWARE},
        year={2007},
        month={7},
        keywords={Actuators  Bandwidth  Data security  Flash memory  Hardware  Open source software  Sensor phenomena and characterization  Telecommunication traffic  Wireless communication  Wireless sensor networks},
        doi={10.1109/COMSWA.2007.382600}
    }
    
  • Atanu Roy Chowdhur
    Somanath Tripath
    Sukumar Nandi
    Year: 2007
    Securing Wireless Sensor Networks Against Spurious Injections
    COMSWARE
    IEEE
    DOI: 10.1109/COMSWA.2007.382600
Atanu Roy Chowdhur1,*, Somanath Tripath2,*, Sukumar Nandi2,*
  • 1: Software Engineering and Technology Lab, Infosys Technologies Ltd, Bangalore- 560100, India
  • 2: Department of Computer Science and Engineering, Indian Institute of Technology, Guwahati, North-Guwahati- 780139, Assam, India
*Contact email: atanu-chowdhury@infosys.co, som@iitg.ernet.in, sukumar@iitg.ernet.in

Abstract

Wireless sensor networks (WSNs) are best suited for perceiving a phenomenon, which in turn forms the basis for controlling an actuator in a corrective plane. However, before the corrective action can be invoked, it is necessary to validate that the data was not injected with a malicious intent. To this end we propose CADA (cellular automata based data authentication mechanism), a lightweight protocol to authenticate data from valid nodes. Unlike its predecessors, it is designed to assume scarcity of multiple resources viz power, processing, storage, bandwidth and radio range.CADA takes advantage of the concurrent operations in cellular automata components and is therefore not only fast but also easily realizable in hardware.