Key Management Scheme for Preventing False Data in Wireless Sensor Network
Journal Title: International Journal of Electronics Communication and Computer Technology - Year 2013, Vol 3, Issue 1
Abstract
Injecting false data attack is a well known serious threat to wireless sensor network, for which an adversary reports bogus information to sink causing error decision at upper level and energy waste in en-route nodes. In this paper, we propose a novel bandwidth-efficient cooperative authentication (BECAN) scheme for filtering injected false data. Based on the random graph characteristics of sensor node deployment and the cooperative bit-compressed authentication technique, the proposed BECAN scheme can save energy by early detecting and filtering the majority of injected false data with minor extra overheads at the en-route nodes. In addition, only a very small fraction of injected false data needs to be checked by the sink, which thus largely reduces the burden of the sink. Both theoretical and simulation results are given to demonstrate the effectiveness of the proposed scheme in terms of high filtering probability and energy saving.
Authors and Affiliations
Bharathidasan. D| P. G. Student, Vel Tech Multi Tech Dr.RR & Dr.SR Engineering College, Avadi, Chennai, India, Murugesan. S| P. G. Student, Vel Tech Multi Tech Dr.RR & Dr.SR Engineering College, Avadi, Chennai, India, Ezhilvendan. M| P. G. Student, Vel Tech Multi Tech Dr.RR & Dr.SR Engineering College, Avadi, Chennai India, Mano Sharmi. K| P. G. Student, Mohamed Sathak Engineering College, Kilakarai, Ramanathapuram, India, Punitha. K| Assistant Professor, Vel Tech Multi Tech Dr.RR & Dr.SR Engg. College, Avadi, Chennai, India
A Study on MIMO Radar Multiple Target Detection System
Multiple Input Multiple Output (MIMO) radar is a novel radar technique developed recently. It has many advantages over conventional phased radar such as anti-intercept of radar signal, low velocity target detection, and...
Analysis of Burst Assembly Modeling for Optical Burst Switched Network
In this paper, we have study the current state of the technology, the Optical burst Switched (OBS) network is the most practical in all-optical architecture. Here we define how Burst Assembly will carried out and also he...
Audio Steganography in a Nutshell
Information hiding technique is a new kind of secret communication technology. Steganography has been proposed as a new alternative technique to enforce data security. A perfect audio Steganographic technique aim at embe...
Generating Different Mobility Scenarios in Ad Hoc Networks
The purpose of mobility models is to describe typical terminal movement so that the analysis for these purposes can be made. Thus, the movement pattern of users plays an important role in performance analysis of mobi...
Comparison of Fiber Based Dispersion Compensation in RZ and NRZ Data Modulation Formats
In this paper, dispersion compensating fibers are used to compensate for the positive dispersion accumulated over the length of transmission fiber. Pre and post dispersion compensation schemes are employed for dispersion...