Key Management Scheme for Preventing False Data in Wireless Sensor Network
Journal Title: International Journal of Electronics Communication and Computer Technology - Year 2013, Vol 3, Issue 1
Abstract
Injecting false data attack is a well known serious threat to wireless sensor network, for which an adversary reports bogus information to sink causing error decision at upper level and energy waste in en-route nodes. In this paper, we propose a novel bandwidth-efficient cooperative authentication (BECAN) scheme for filtering injected false data. Based on the random graph characteristics of sensor node deployment and the cooperative bit-compressed authentication technique, the proposed BECAN scheme can save energy by early detecting and filtering the majority of injected false data with minor extra overheads at the en-route nodes. In addition, only a very small fraction of injected false data needs to be checked by the sink, which thus largely reduces the burden of the sink. Both theoretical and simulation results are given to demonstrate the effectiveness of the proposed scheme in terms of high filtering probability and energy saving.
Authors and Affiliations
Bharathidasan. D| P. G. Student, Vel Tech Multi Tech Dr.RR & Dr.SR Engineering College, Avadi, Chennai, India, Murugesan. S| P. G. Student, Vel Tech Multi Tech Dr.RR & Dr.SR Engineering College, Avadi, Chennai, India, Ezhilvendan. M| P. G. Student, Vel Tech Multi Tech Dr.RR & Dr.SR Engineering College, Avadi, Chennai India, Mano Sharmi. K| P. G. Student, Mohamed Sathak Engineering College, Kilakarai, Ramanathapuram, India, Punitha. K| Assistant Professor, Vel Tech Multi Tech Dr.RR & Dr.SR Engg. College, Avadi, Chennai, India
Linear Predictive Vocoder
The paper discusses linear predictive coder and decoder for speech signals. The basic idea behind linear predictive analysis is that a speech sample can be approximated as a linear combination of past speech samples. The...
Fingerprint and Speech Fusion: A Multimodal Biometric System
Information security and authentication of person have become an important factor in security systems. Personal Identification Numbers or passwords and key devices such as smart cards are not reliable and accurate te...
Advance Technique in Demodulation of Non-Coherent Binary Phase Shift Keying
Demodulation of Non Coherent Binary Phase Shift Keying, by using STEL -2110A Chip Circuitry VDSP++4.5 software Technique, Both Time and Frequency recovery of the signal is possible, but in this paper only timing recovery...
Design and Implementation of 64-Bit Execute Stage for VLIW Processor Architecture on FPGA
FPGA implementation of 64-bit execute unit for VLIW processor, and improve power representation have been done in this paper. VHDL is used to modelled this architecture. VLIW stands for Very Long Instruction Word. This P...
Digitally Programmable Floating Impedance Multiplier using DVCC
A novel digitally programmable floating impedance multiplier is presented. It is realized using differential voltage current conveyor and a digital control module. Digitally programmable floating impedance multipliers...