Figment Authentication Scheme in Wireless Sensor Network
Sensor nodes are of low-cost and hence vulnerable to attacks. The adversaries need not endure hardship to control these nodes. Malicious nodes or compromised nodes are difficult to detect. These malicious nodes drain the energy available, give false readings, project itself to be as one of the route...
Saved in:
Published in | Security Technology, Disaster Recovery and Business Continuity Vol. 122; pp. 220 - 223 |
---|---|
Main Authors | , |
Format | Book Chapter |
Language | English |
Published |
Germany
Springer Berlin / Heidelberg
2010
Springer Berlin Heidelberg |
Series | Communications in Computer and Information Science |
Subjects | |
Online Access | Get full text |
ISBN | 3642176097 9783642176098 |
ISSN | 1865-0929 1865-0937 |
DOI | 10.1007/978-3-642-17610-4_24 |
Cover
Summary: | Sensor nodes are of low-cost and hence vulnerable to attacks. The adversaries need not endure hardship to control these nodes. Malicious nodes or compromised nodes are difficult to detect. These malicious nodes drain the energy available, give false readings, project itself to be as one of the routers hence attracting all the packets leading to denial of service attack.
This paper is trying to test the nodes for its fidelity by considering one of the normal procedures to initiate action among the normal nodes. The paper utilizes public key cryptographic methods and TDMA technology to accomplish the task. |
---|---|
ISBN: | 3642176097 9783642176098 |
ISSN: | 1865-0929 1865-0937 |
DOI: | 10.1007/978-3-642-17610-4_24 |