Securing Wireless Sensor Networks Against Spurious Injections
Wireless sensor networks (WSNs) are best suited for perceiving a phenomenon, which in turn forms the basis for controlling an actuator in a corrective plane. However, before the corrective action can be invoked, it is necessary to validate that the data was not injected with a malicious intent. To t...
Saved in:
Published in | 2007 2nd International Conference on Communication Systems Software & Middleware : Bangalore, India, 7-12 January 2007 pp. 1 - 5 |
---|---|
Main Authors | , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
01.01.2007
|
Subjects | |
Online Access | Get full text |
ISBN | 1424406137 9781424406135 |
DOI | 10.1109/COMSWA.2007.382600 |
Cover
Loading…
Abstract | Wireless sensor networks (WSNs) are best suited for perceiving a phenomenon, which in turn forms the basis for controlling an actuator in a corrective plane. However, before the corrective action can be invoked, it is necessary to validate that the data was not injected with a malicious intent. To this end we propose CADA (cellular automata based data authentication mechanism), a lightweight protocol to authenticate data from valid nodes. Unlike its predecessors, it is designed to assume scarcity of multiple resources viz power, processing, storage, bandwidth and radio range.CADA takes advantage of the concurrent operations in cellular automata components and is therefore not only fast but also easily realizable in hardware. |
---|---|
AbstractList | Wireless sensor networks (WSNs) are best suited for perceiving a phenomenon, which in turn forms the basis for controlling an actuator in a corrective plane. However, before the corrective action can be invoked, it is necessary to validate that the data was not injected with a malicious intent. To this end we propose CADA (cellular automata based data authentication mechanism), a lightweight protocol to authenticate data from valid nodes. Unlike its predecessors, it is designed to assume scarcity of multiple resources viz power, processing, storage, bandwidth and radio range.CADA takes advantage of the concurrent operations in cellular automata components and is therefore not only fast but also easily realizable in hardware. |
Author | Nandi, Sukumar Tripathy, Somanath Chowdhury, Atanu Roy |
Author_xml | – sequence: 1 givenname: Atanu Roy surname: Chowdhury fullname: Chowdhury, Atanu Roy email: atanu_chowdhury@infosys.com organization: Software Eng. & Technol. Labs, Infosys Technol. Ltd, Bangalore, India – sequence: 2 givenname: Somanath surname: Tripathy fullname: Tripathy, Somanath email: som@iitg.ernet.in – sequence: 3 givenname: Sukumar surname: Nandi fullname: Nandi, Sukumar email: sukumar@iitg.ernet.in |
BookMark | eNpFzM1Kw0AUBeARFbS1L6CbeYHEOzM3M5mFixD8KfRnEaHLkjQ3ZWqdlJkU8e0NKHg2hwMfZ8KufO-JsXsBqRBgH8v1stoUqQQwqcqlBrhgE4ESEbTA7PJ_KHPDZjEeYIyyo8Vb9lTR7hyc3_ONC3SkGHlFPvaBr2j46sNH5MW-dj4OvDqNsD9HPvcH2g2u9_GOXXf1MdLsr6esenl-L9-Sxfp1XhaLxFkYkgY1yVa0ynZGCFPnlGvqGmWbzMisldS0KIWyhkSONoOGDNlO1wIJRqKm7OH31RHR9hTcZx2-tyh1DhLVD_y4SpM |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/COMSWA.2007.382600 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISBN | 1424406145 9781424406142 |
EndPage | 5 |
ExternalDocumentID | 4268024 |
Genre | orig-research |
GroupedDBID | 6IE 6IF 6IK 6IL 6IN AAJGR AARBI AAWTH ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK IERZE OCL RIE RIL |
ID | FETCH-LOGICAL-i90t-b46e2d1d39f7117a8e86efb39b5725d2ebd421397e184950be7e9f6a14e0b573 |
IEDL.DBID | RIE |
ISBN | 1424406137 9781424406135 |
IngestDate | Wed Aug 27 02:43:39 EDT 2025 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i90t-b46e2d1d39f7117a8e86efb39b5725d2ebd421397e184950be7e9f6a14e0b573 |
PageCount | 5 |
ParticipantIDs | ieee_primary_4268024 |
PublicationCentury | 2000 |
PublicationDate | 2007-Jan. |
PublicationDateYYYYMMDD | 2007-01-01 |
PublicationDate_xml | – month: 01 year: 2007 text: 2007-Jan. |
PublicationDecade | 2000 |
PublicationTitle | 2007 2nd International Conference on Communication Systems Software & Middleware : Bangalore, India, 7-12 January 2007 |
PublicationTitleAbbrev | COMSWA |
PublicationYear | 2007 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
SSID | ssj0000393824 |
Score | 1.3862423 |
Snippet | Wireless sensor networks (WSNs) are best suited for perceiving a phenomenon, which in turn forms the basis for controlling an actuator in a corrective plane.... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 1 |
SubjectTerms | Actuators Bandwidth Data security Flash memory Hardware Open source software Sensor phenomena and characterization Telecommunication traffic Wireless communication Wireless sensor networks |
Title | Securing Wireless Sensor Networks Against Spurious Injections |
URI | https://ieeexplore.ieee.org/document/4268024 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV27TsMwFLXaTrDwaBFveWAkbR62Ew8MVUVVkFqQAqJbFde3VQElVZMsfD3XeZQKMbDFkS1ZtuRz7_U5x4TcRHgqKlcqS4D0LOa7c8s471mguYTAFpFTsnwnYvTKHqd82iC3Wy0MABTkM-iaz-IuXyfz3JTKeogmAWJKkzQxcSu1Wtt6itGYBi6rtVsGpvza0qlq81o0Y8ve4GkcvvVLC0McJ4zCbed5lQJdhgdkXM-rJJV8dPNMdedfvywb_zvxQ9L50fHR5y1CHZEGxMdkf8eCsE3uqoL7khoe7CeeezTEzDbZ0ElJEE9pfxmtMIik4Ro7JnlKH-L3gsAVpx0SDu9fBiOrelLBWkk7sxQT4GpHe3LhO44fBRAIWChPKu67XLugNHNNTAiY-EluK_BBLnDDGNjYxTshrTiJ4ZRQrsF2wJMs0gwjMh1hGMCVIwBzOsHs4Iy0zTLM1qVnxqxagfO_f1-QvbJmakobl6SVbXK4QrDP1HWxy99JY6Rp |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3LTgIxFL1BXKgbH2B8OwuXDs6j7UwXLgiRgAKaDEZ2ZEovBDUzBGY2fr3tPJAYF-6mkzZp2qTn3ttzTgFuQnUqCocLkyF3TeI5E1M775koKUffYqGds3wHrPNKHkd0VIHbtRYGETPyGTb0Z3aXL-NJqktldwpNfIUpW7BNtRg3V2utKypaZeo7pFRvaaDySlOnok1L2YzF71rP_eCtmZsYqnFMa9w2HljJ8KW9D_1yZjmt5KORJqIx-fpl2vjfqR9A_UfJZ7ysMeoQKhgdwd6GCWEN7ouS-8zQTNhPdfIZgcpt46UxyCniK6M5C-cqjDSCheoYpyujG71nFK5oVYeg_TBsdcziUQVzzq3EFIShI23p8qln217oo89wKlwuqOdQ6aCQxNFRIarUj1NLoId8qraMoKW6uMdQjeIIT8CgEi0bXU5CSVRMJkMVCFBhM1RZHSOWfwo1vQzjRe6aMS5W4Ozv39ew0xn2e-Ned_B0Drt5BVUXOi6gmixTvFTQn4irbMe_ARHfp7E |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2007+2nd+International+Conference+on+Communication+Systems+Software+%26+Middleware+%3A+Bangalore%2C+India%2C+7-12+January+2007&rft.atitle=Securing+Wireless+Sensor+Networks+Against+Spurious+Injections&rft.au=Chowdhury%2C+Atanu+Roy&rft.au=Tripathy%2C+Somanath&rft.au=Nandi%2C+Sukumar&rft.date=2007-01-01&rft.pub=IEEE&rft.isbn=9781424406135&rft.spage=1&rft.epage=5&rft_id=info:doi/10.1109%2FCOMSWA.2007.382600&rft.externalDocID=4268024 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424406135/lc.gif&client=summon&freeimage=true |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424406135/mc.gif&client=summon&freeimage=true |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424406135/sc.gif&client=summon&freeimage=true |