Figment Authentication Scheme in Wireless Sensor Network

Sensor nodes are of low-cost and hence vulnerable to attacks. The adversaries need not endure hardship to control these nodes. Malicious nodes or compromised nodes are difficult to detect. These malicious nodes drain the energy available, give false readings, project itself to be as one of the route...

Full description

Saved in:
Bibliographic Details
Published inSecurity Technology, Disaster Recovery and Business Continuity Vol. 122; pp. 220 - 223
Main Authors Ambika, N., Raju, G. T.
Format Book Chapter
LanguageEnglish
Published Germany Springer Berlin / Heidelberg 2010
Springer Berlin Heidelberg
SeriesCommunications in Computer and Information Science
Subjects
Online AccessGet full text
ISBN3642176097
9783642176098
ISSN1865-0929
1865-0937
DOI10.1007/978-3-642-17610-4_24

Cover

More Information
Summary:Sensor nodes are of low-cost and hence vulnerable to attacks. The adversaries need not endure hardship to control these nodes. Malicious nodes or compromised nodes are difficult to detect. These malicious nodes drain the energy available, give false readings, project itself to be as one of the routers hence attracting all the packets leading to denial of service attack. This paper is trying to test the nodes for its fidelity by considering one of the normal procedures to initiate action among the normal nodes. The paper utilizes public key cryptographic methods and TDMA technology to accomplish the task.
ISBN:3642176097
9783642176098
ISSN:1865-0929
1865-0937
DOI:10.1007/978-3-642-17610-4_24