IIUM Repository

Securing sensor reports in wireless sensor networks

Pathan, Al-Sakib Khan and Hong, Choong Seon (2007) Securing sensor reports in wireless sensor networks. In: Lecture Notes in Computer Science (LNCS). Springer-Verlag, Berlin, Germany, pp. 881-890.

[img] PDF - Published Version
Restricted to Registered users only

Download (303kB) | Request a copy

Abstract

The sensor reports from a wireless sensor network are often used extensively in the decision making process in many systems and applications. Hence, classifying real and false sensor reports is necessary to avoid unwanted results. In this paper, we propose a scheme for securing the sensor reports in a wireless sensor network. We use one-way hash chain and pre-stored shared secret keys to provide data transmission security for the reports that travel from any source node to the base station. To introduce data freshness, our scheme includes an optional key refreshment mechanism which could be applied depending upon the requirement or the application at hand. We present an analysis along with the detailed description of our scheme.

Item Type: Book Chapter
Additional Information: 6841/712
Uncontrolled Keywords: wireless sensor networks
Subjects: Q Science > Q Science (General)
Q Science > QA Mathematics > QA76 Computer software
Kulliyyahs/Centres/Divisions/Institutes (Can select more than one option. Press CONTROL button): Kulliyyah of Information and Communication Technology
Kulliyyah of Information and Communication Technology

Kulliyyah of Information and Communication Technology > Department of Computer Science
Kulliyyah of Information and Communication Technology > Department of Computer Science
Depositing User: Dr. Al-Sakib Khan Pathan
Date Deposited: 02 Aug 2011 12:15
Last Modified: 02 Aug 2011 12:16
URI: http://irep.iium.edu.my/id/eprint/712

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year