Securing Wireless Sensor Networks Against Spurious Injections

Wireless sensor networks (WSNs) are best suited for perceiving a phenomenon, which in turn forms the basis for controlling an actuator in a corrective plane. However, before the corrective action can be invoked, it is necessary to validate that the data was not injected with a malicious intent. To t...

Full description

Saved in:
Bibliographic Details
Published in2007 2nd International Conference on Communication Systems Software & Middleware : Bangalore, India, 7-12 January 2007 pp. 1 - 5
Main Authors Chowdhury, Atanu Roy, Tripathy, Somanath, Nandi, Sukumar
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.01.2007
Subjects
Online AccessGet full text
ISBN1424406137
9781424406135
DOI10.1109/COMSWA.2007.382600

Cover

Loading…
Abstract Wireless sensor networks (WSNs) are best suited for perceiving a phenomenon, which in turn forms the basis for controlling an actuator in a corrective plane. However, before the corrective action can be invoked, it is necessary to validate that the data was not injected with a malicious intent. To this end we propose CADA (cellular automata based data authentication mechanism), a lightweight protocol to authenticate data from valid nodes. Unlike its predecessors, it is designed to assume scarcity of multiple resources viz power, processing, storage, bandwidth and radio range.CADA takes advantage of the concurrent operations in cellular automata components and is therefore not only fast but also easily realizable in hardware.
AbstractList Wireless sensor networks (WSNs) are best suited for perceiving a phenomenon, which in turn forms the basis for controlling an actuator in a corrective plane. However, before the corrective action can be invoked, it is necessary to validate that the data was not injected with a malicious intent. To this end we propose CADA (cellular automata based data authentication mechanism), a lightweight protocol to authenticate data from valid nodes. Unlike its predecessors, it is designed to assume scarcity of multiple resources viz power, processing, storage, bandwidth and radio range.CADA takes advantage of the concurrent operations in cellular automata components and is therefore not only fast but also easily realizable in hardware.
Author Nandi, Sukumar
Tripathy, Somanath
Chowdhury, Atanu Roy
Author_xml – sequence: 1
  givenname: Atanu Roy
  surname: Chowdhury
  fullname: Chowdhury, Atanu Roy
  email: atanu_chowdhury@infosys.com
  organization: Software Eng. & Technol. Labs, Infosys Technol. Ltd, Bangalore, India
– sequence: 2
  givenname: Somanath
  surname: Tripathy
  fullname: Tripathy, Somanath
  email: som@iitg.ernet.in
– sequence: 3
  givenname: Sukumar
  surname: Nandi
  fullname: Nandi, Sukumar
  email: sukumar@iitg.ernet.in
BookMark eNpFzM1Kw0AUBeARFbS1L6CbeYHEOzM3M5mFixD8KfRnEaHLkjQ3ZWqdlJkU8e0NKHg2hwMfZ8KufO-JsXsBqRBgH8v1stoUqQQwqcqlBrhgE4ESEbTA7PJ_KHPDZjEeYIyyo8Vb9lTR7hyc3_ONC3SkGHlFPvaBr2j46sNH5MW-dj4OvDqNsD9HPvcH2g2u9_GOXXf1MdLsr6esenl-L9-Sxfp1XhaLxFkYkgY1yVa0ynZGCFPnlGvqGmWbzMisldS0KIWyhkSONoOGDNlO1wIJRqKm7OH31RHR9hTcZx2-tyh1DhLVD_y4SpM
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/COMSWA.2007.382600
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISBN 1424406145
9781424406142
EndPage 5
ExternalDocumentID 4268024
Genre orig-research
GroupedDBID 6IE
6IF
6IK
6IL
6IN
AAJGR
AARBI
AAWTH
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
IERZE
OCL
RIE
RIL
ID FETCH-LOGICAL-i90t-b46e2d1d39f7117a8e86efb39b5725d2ebd421397e184950be7e9f6a14e0b573
IEDL.DBID RIE
ISBN 1424406137
9781424406135
IngestDate Wed Aug 27 02:43:39 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i90t-b46e2d1d39f7117a8e86efb39b5725d2ebd421397e184950be7e9f6a14e0b573
PageCount 5
ParticipantIDs ieee_primary_4268024
PublicationCentury 2000
PublicationDate 2007-Jan.
PublicationDateYYYYMMDD 2007-01-01
PublicationDate_xml – month: 01
  year: 2007
  text: 2007-Jan.
PublicationDecade 2000
PublicationTitle 2007 2nd International Conference on Communication Systems Software & Middleware : Bangalore, India, 7-12 January 2007
PublicationTitleAbbrev COMSWA
PublicationYear 2007
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0000393824
Score 1.3862423
Snippet Wireless sensor networks (WSNs) are best suited for perceiving a phenomenon, which in turn forms the basis for controlling an actuator in a corrective plane....
SourceID ieee
SourceType Publisher
StartPage 1
SubjectTerms Actuators
Bandwidth
Data security
Flash memory
Hardware
Open source software
Sensor phenomena and characterization
Telecommunication traffic
Wireless communication
Wireless sensor networks
Title Securing Wireless Sensor Networks Against Spurious Injections
URI https://ieeexplore.ieee.org/document/4268024
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV27TsMwFLXaTrDwaBFveWAkbR62Ew8MVUVVkFqQAqJbFde3VQElVZMsfD3XeZQKMbDFkS1ZtuRz7_U5x4TcRHgqKlcqS4D0LOa7c8s471mguYTAFpFTsnwnYvTKHqd82iC3Wy0MABTkM-iaz-IuXyfz3JTKeogmAWJKkzQxcSu1Wtt6itGYBi6rtVsGpvza0qlq81o0Y8ve4GkcvvVLC0McJ4zCbed5lQJdhgdkXM-rJJV8dPNMdedfvywb_zvxQ9L50fHR5y1CHZEGxMdkf8eCsE3uqoL7khoe7CeeezTEzDbZ0ElJEE9pfxmtMIik4Ro7JnlKH-L3gsAVpx0SDu9fBiOrelLBWkk7sxQT4GpHe3LhO44fBRAIWChPKu67XLugNHNNTAiY-EluK_BBLnDDGNjYxTshrTiJ4ZRQrsF2wJMs0gwjMh1hGMCVIwBzOsHs4Iy0zTLM1qVnxqxagfO_f1-QvbJmakobl6SVbXK4QrDP1HWxy99JY6Rp
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3LTgIxFL1BXKgbH2B8OwuXDs6j7UwXLgiRgAKaDEZ2ZEovBDUzBGY2fr3tPJAYF-6mkzZp2qTn3ttzTgFuQnUqCocLkyF3TeI5E1M775koKUffYqGds3wHrPNKHkd0VIHbtRYGETPyGTb0Z3aXL-NJqktldwpNfIUpW7BNtRg3V2utKypaZeo7pFRvaaDySlOnok1L2YzF71rP_eCtmZsYqnFMa9w2HljJ8KW9D_1yZjmt5KORJqIx-fpl2vjfqR9A_UfJZ7ysMeoQKhgdwd6GCWEN7ouS-8zQTNhPdfIZgcpt46UxyCniK6M5C-cqjDSCheoYpyujG71nFK5oVYeg_TBsdcziUQVzzq3EFIShI23p8qln217oo89wKlwuqOdQ6aCQxNFRIarUj1NLoId8qraMoKW6uMdQjeIIT8CgEi0bXU5CSVRMJkMVCFBhM1RZHSOWfwo1vQzjRe6aMS5W4Ozv39ew0xn2e-Ned_B0Drt5BVUXOi6gmixTvFTQn4irbMe_ARHfp7E
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2007+2nd+International+Conference+on+Communication+Systems+Software+%26+Middleware+%3A+Bangalore%2C+India%2C+7-12+January+2007&rft.atitle=Securing+Wireless+Sensor+Networks+Against+Spurious+Injections&rft.au=Chowdhury%2C+Atanu+Roy&rft.au=Tripathy%2C+Somanath&rft.au=Nandi%2C+Sukumar&rft.date=2007-01-01&rft.pub=IEEE&rft.isbn=9781424406135&rft.spage=1&rft.epage=5&rft_id=info:doi/10.1109%2FCOMSWA.2007.382600&rft.externalDocID=4268024
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424406135/lc.gif&client=summon&freeimage=true
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424406135/mc.gif&client=summon&freeimage=true
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424406135/sc.gif&client=summon&freeimage=true