Securing sensor reports in wireless sensor networks

The sensor reports from a wireless sensor network are often used extensively in the decision making process in many systems and applications. Hence, classifying real and false sensor reports is necessary to avoid unwanted results. In this paper, we propose a scheme for securing the sensor reports in...

Full description

Saved in:
Bibliographic Details
Main Authors: Pathan, Al-Sakib Khan, Hong, Choong Seon
Other Authors: Kermarrec, A.-M.
Format: Book Chapter
Language:English
Published: Springer-Verlag 2007
Subjects:
Online Access:http://irep.iium.edu.my/712/1/Securing_Sensor_Reports.pdf
http://irep.iium.edu.my/712/
http://www.springerlink.com/content/bn366014r31r2214/
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:The sensor reports from a wireless sensor network are often used extensively in the decision making process in many systems and applications. Hence, classifying real and false sensor reports is necessary to avoid unwanted results. In this paper, we propose a scheme for securing the sensor reports in a wireless sensor network. We use one-way hash chain and pre-stored shared secret keys to provide data transmission security for the reports that travel from any source node to the base station. To introduce data freshness, our scheme includes an optional key refreshment mechanism which could be applied depending upon the requirement or the application at hand. We present an analysis along with the detailed description of our scheme.