Key Management Scheme for Preventing False Data in Wireless Sensor Network
Journal Title: International Journal of Electronics Communication and Computer Technology - Year 2013, Vol 3, Issue 1
Abstract
Injecting false data attack is a well known serious threat to wireless sensor network, for which an adversary reports bogus information to sink causing error decision at upper level and energy waste in en-route nodes. In this paper, we propose a novel bandwidth-efficient cooperative authentication (BECAN) scheme for filtering injected false data. Based on the random graph characteristics of sensor node deployment and the cooperative bit-compressed authentication technique, the proposed BECAN scheme can save energy by early detecting and filtering the majority of injected false data with minor extra overheads at the en-route nodes. In addition, only a very small fraction of injected false data needs to be checked by the sink, which thus largely reduces the burden of the sink. Both theoretical and simulation results are given to demonstrate the effectiveness of the proposed scheme in terms of high filtering probability and energy saving.
Authors and Affiliations
Bharathidasan. D| P. G. Student, Vel Tech Multi Tech Dr.RR & Dr.SR Engineering College, Avadi, Chennai, India, Murugesan. S| P. G. Student, Vel Tech Multi Tech Dr.RR & Dr.SR Engineering College, Avadi, Chennai, India, Ezhilvendan. M| P. G. Student, Vel Tech Multi Tech Dr.RR & Dr.SR Engineering College, Avadi, Chennai India, Mano Sharmi. K| P. G. Student, Mohamed Sathak Engineering College, Kilakarai, Ramanathapuram, India, Punitha. K| Assistant Professor, Vel Tech Multi Tech Dr.RR & Dr.SR Engg. College, Avadi, Chennai, India
A Principal Component Analysis Method for Recognition of Human Faces: Eigenfaces Approach
Facial recognition is a biometric method of identifying a person based on a picture of their face. Facial recognition system is very much important for security, surveillance and in forensics. In this paper, a face recog...
Reliable Buffer less Video Streaming
Peer-to-Peer (P2P) overlays offer a promising approach to stream live video from a single source to a large number of receivers (or peers) over the Internet without any special support from the network. This approach is...
A Novel Approach on DWT Province for Colorant Watermarking
This article aims at lightweight, visionless recognition of additive spread-spectrum watermarks in the DWT domain. We focus on two host signal clatter models and two types of postulate tests for watermark recognition....
Optimal Cryptographic Technique to increase the Data Security
There are many aspects to security ranging from secure commerce and payments to private communications and protecting passwords. One essential aspect for secure communications is that of secret key Cryptography. It is th...
Design of Pulse Triggered FlipFlop for Low Power Applications
Most important challenge in modern VLSI design along with area and speed is the power consumption. Flip flop is the basic element in digital system which plays very important role. In this paper, a low power pulse tri...