Securing sensor reports in wireless sensor networks

The sensor reports from a wireless sensor network are often used extensively in the decision making process in many systems and applications. Hence, classifying real and false sensor reports is necessary to avoid unwanted results. In this paper, we propose a scheme for securing the sensor reports in...

Full description

Bibliographic Details
Main Authors: Pathan, Al-Sakib Khan, Hong, Choong Seon
Other Authors: Kermarrec, A.-M.
Format: Book Chapter
Language:English
Published: Springer-Verlag 2007
Subjects:
Online Access:http://irep.iium.edu.my/712/
http://irep.iium.edu.my/712/1/Securing_Sensor_Reports.pdf
_version_ 1848775745593147392
author Pathan, Al-Sakib Khan
Hong, Choong Seon
author2 Kermarrec, A.-M.
author_facet Kermarrec, A.-M.
Pathan, Al-Sakib Khan
Hong, Choong Seon
author_sort Pathan, Al-Sakib Khan
building IIUM Repository
collection Online Access
description The sensor reports from a wireless sensor network are often used extensively in the decision making process in many systems and applications. Hence, classifying real and false sensor reports is necessary to avoid unwanted results. In this paper, we propose a scheme for securing the sensor reports in a wireless sensor network. We use one-way hash chain and pre-stored shared secret keys to provide data transmission security for the reports that travel from any source node to the base station. To introduce data freshness, our scheme includes an optional key refreshment mechanism which could be applied depending upon the requirement or the application at hand. We present an analysis along with the detailed description of our scheme.
first_indexed 2025-11-14T14:19:05Z
format Book Chapter
id iium-712
institution International Islamic University Malaysia
institution_category Local University
language English
last_indexed 2025-11-14T14:19:05Z
publishDate 2007
publisher Springer-Verlag
recordtype eprints
repository_type Digital Repository
spelling iium-7122011-08-02T04:16:35Z http://irep.iium.edu.my/712/ Securing sensor reports in wireless sensor networks Pathan, Al-Sakib Khan Hong, Choong Seon Q Science (General) QA76 Computer software The sensor reports from a wireless sensor network are often used extensively in the decision making process in many systems and applications. Hence, classifying real and false sensor reports is necessary to avoid unwanted results. In this paper, we propose a scheme for securing the sensor reports in a wireless sensor network. We use one-way hash chain and pre-stored shared secret keys to provide data transmission security for the reports that travel from any source node to the base station. To introduce data freshness, our scheme includes an optional key refreshment mechanism which could be applied depending upon the requirement or the application at hand. We present an analysis along with the detailed description of our scheme. Springer-Verlag Kermarrec, A.-M. Bougé, L. Priol, T. 2007 Book Chapter PeerReviewed application/pdf en http://irep.iium.edu.my/712/1/Securing_Sensor_Reports.pdf Pathan, Al-Sakib Khan and Hong, Choong Seon (2007) Securing sensor reports in wireless sensor networks. In: Lecture Notes in Computer Science (LNCS). Springer-Verlag, Berlin, Germany, pp. 881-890. http://www.springerlink.com/content/bn366014r31r2214/ DOI: 10.1007/978-3-540-74466-5_95
spellingShingle Q Science (General)
QA76 Computer software
Pathan, Al-Sakib Khan
Hong, Choong Seon
Securing sensor reports in wireless sensor networks
title Securing sensor reports in wireless sensor networks
title_full Securing sensor reports in wireless sensor networks
title_fullStr Securing sensor reports in wireless sensor networks
title_full_unstemmed Securing sensor reports in wireless sensor networks
title_short Securing sensor reports in wireless sensor networks
title_sort securing sensor reports in wireless sensor networks
topic Q Science (General)
QA76 Computer software
url http://irep.iium.edu.my/712/
http://irep.iium.edu.my/712/
http://irep.iium.edu.my/712/
http://irep.iium.edu.my/712/1/Securing_Sensor_Reports.pdf