Securing sensor reports in wireless sensor networks

The sensor reports from a wireless sensor network are often used extensively in the decision making process in many systems and applications. Hence, classifying real and false sensor reports is necessary to avoid unwanted results. In this paper, we propose a scheme for securing the sensor reports in...

Full description

Saved in:
Bibliographic Details
Main Authors: Pathan, Al-Sakib Khan, Hong, Choong Seon
Other Authors: Kermarrec, A.-M.
Format: Book Chapter
Language:English
Published: Springer-Verlag 2007
Subjects:
Online Access:http://irep.iium.edu.my/712/1/Securing_Sensor_Reports.pdf
http://irep.iium.edu.my/712/
http://www.springerlink.com/content/bn366014r31r2214/
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.iium.irep.712
record_format dspace
spelling my.iium.irep.7122011-08-02T04:16:35Z http://irep.iium.edu.my/712/ Securing sensor reports in wireless sensor networks Pathan, Al-Sakib Khan Hong, Choong Seon Q Science (General) QA76 Computer software The sensor reports from a wireless sensor network are often used extensively in the decision making process in many systems and applications. Hence, classifying real and false sensor reports is necessary to avoid unwanted results. In this paper, we propose a scheme for securing the sensor reports in a wireless sensor network. We use one-way hash chain and pre-stored shared secret keys to provide data transmission security for the reports that travel from any source node to the base station. To introduce data freshness, our scheme includes an optional key refreshment mechanism which could be applied depending upon the requirement or the application at hand. We present an analysis along with the detailed description of our scheme. Springer-Verlag Kermarrec, A.-M. Bougé, L. Priol, T. 2007 Book Chapter REM application/pdf en http://irep.iium.edu.my/712/1/Securing_Sensor_Reports.pdf Pathan, Al-Sakib Khan and Hong, Choong Seon (2007) Securing sensor reports in wireless sensor networks. In: Lecture Notes in Computer Science (LNCS). Springer-Verlag, Berlin, Germany, pp. 881-890. http://www.springerlink.com/content/bn366014r31r2214/ DOI: 10.1007/978-3-540-74466-5_95
institution Universiti Islam Antarabangsa Malaysia
building IIUM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider International Islamic University Malaysia
content_source IIUM Repository (IREP)
url_provider http://irep.iium.edu.my/
language English
topic Q Science (General)
QA76 Computer software
spellingShingle Q Science (General)
QA76 Computer software
Pathan, Al-Sakib Khan
Hong, Choong Seon
Securing sensor reports in wireless sensor networks
description The sensor reports from a wireless sensor network are often used extensively in the decision making process in many systems and applications. Hence, classifying real and false sensor reports is necessary to avoid unwanted results. In this paper, we propose a scheme for securing the sensor reports in a wireless sensor network. We use one-way hash chain and pre-stored shared secret keys to provide data transmission security for the reports that travel from any source node to the base station. To introduce data freshness, our scheme includes an optional key refreshment mechanism which could be applied depending upon the requirement or the application at hand. We present an analysis along with the detailed description of our scheme.
author2 Kermarrec, A.-M.
author_facet Kermarrec, A.-M.
Pathan, Al-Sakib Khan
Hong, Choong Seon
format Book Chapter
author Pathan, Al-Sakib Khan
Hong, Choong Seon
author_sort Pathan, Al-Sakib Khan
title Securing sensor reports in wireless sensor networks
title_short Securing sensor reports in wireless sensor networks
title_full Securing sensor reports in wireless sensor networks
title_fullStr Securing sensor reports in wireless sensor networks
title_full_unstemmed Securing sensor reports in wireless sensor networks
title_sort securing sensor reports in wireless sensor networks
publisher Springer-Verlag
publishDate 2007
url http://irep.iium.edu.my/712/1/Securing_Sensor_Reports.pdf
http://irep.iium.edu.my/712/
http://www.springerlink.com/content/bn366014r31r2214/
_version_ 1643604658280726528
score 13.159267