Research Article
Securing Wireless Sensor Networks Against Spurious Injections
@INPROCEEDINGS{10.1109/COMSWA.2007.382600, author={ Atanu Roy Chowdhur and Somanath Tripath and Sukumar Nandi}, title={Securing Wireless Sensor Networks Against Spurious Injections}, proceedings={2nd International IEEE Conference on Communication System Software and Middleware}, publisher={IEEE}, proceedings_a={COMSWARE}, year={2007}, month={7}, keywords={Actuators Bandwidth Data security Flash memory Hardware Open source software Sensor phenomena and characterization Telecommunication traffic Wireless communication Wireless sensor networks}, doi={10.1109/COMSWA.2007.382600} }
- Atanu Roy Chowdhur
Somanath Tripath
Sukumar Nandi
Year: 2007
Securing Wireless Sensor Networks Against Spurious Injections
COMSWARE
IEEE
DOI: 10.1109/COMSWA.2007.382600
Abstract
Wireless sensor networks (WSNs) are best suited for perceiving a phenomenon, which in turn forms the basis for controlling an actuator in a corrective plane. However, before the corrective action can be invoked, it is necessary to validate that the data was not injected with a malicious intent. To this end we propose CADA (cellular automata based data authentication mechanism), a lightweight protocol to authenticate data from valid nodes. Unlike its predecessors, it is designed to assume scarcity of multiple resources viz power, processing, storage, bandwidth and radio range.CADA takes advantage of the concurrent operations in cellular automata components and is therefore not only fast but also easily realizable in hardware.