Securing sensor reports in wireless sensor networks
The sensor reports from a wireless sensor network are often used extensively in the decision making process in many systems and applications. Hence, classifying real and false sensor reports is necessary to avoid unwanted results. In this paper, we propose a scheme for securing the sensor reports in...
| Main Authors: | , |
|---|---|
| Other Authors: | |
| Format: | Book Chapter |
| Language: | English |
| Published: |
Springer-Verlag
2007
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/712/ http://irep.iium.edu.my/712/1/Securing_Sensor_Reports.pdf |
| _version_ | 1848775745593147392 |
|---|---|
| author | Pathan, Al-Sakib Khan Hong, Choong Seon |
| author2 | Kermarrec, A.-M. |
| author_facet | Kermarrec, A.-M. Pathan, Al-Sakib Khan Hong, Choong Seon |
| author_sort | Pathan, Al-Sakib Khan |
| building | IIUM Repository |
| collection | Online Access |
| description | The sensor reports from a wireless sensor network are often used extensively in the decision making process in many systems and applications. Hence, classifying real and false sensor reports is necessary to avoid unwanted results. In this paper, we propose a scheme for securing the sensor reports in a wireless sensor network. We use one-way hash chain and pre-stored shared secret keys to provide data transmission security for the reports that travel from any source node to the base station. To introduce data freshness, our scheme includes an optional key refreshment mechanism which could be applied depending upon the requirement or the application at hand. We present an analysis along with the detailed description of our scheme. |
| first_indexed | 2025-11-14T14:19:05Z |
| format | Book Chapter |
| id | iium-712 |
| institution | International Islamic University Malaysia |
| institution_category | Local University |
| language | English |
| last_indexed | 2025-11-14T14:19:05Z |
| publishDate | 2007 |
| publisher | Springer-Verlag |
| recordtype | eprints |
| repository_type | Digital Repository |
| spelling | iium-7122011-08-02T04:16:35Z http://irep.iium.edu.my/712/ Securing sensor reports in wireless sensor networks Pathan, Al-Sakib Khan Hong, Choong Seon Q Science (General) QA76 Computer software The sensor reports from a wireless sensor network are often used extensively in the decision making process in many systems and applications. Hence, classifying real and false sensor reports is necessary to avoid unwanted results. In this paper, we propose a scheme for securing the sensor reports in a wireless sensor network. We use one-way hash chain and pre-stored shared secret keys to provide data transmission security for the reports that travel from any source node to the base station. To introduce data freshness, our scheme includes an optional key refreshment mechanism which could be applied depending upon the requirement or the application at hand. We present an analysis along with the detailed description of our scheme. Springer-Verlag Kermarrec, A.-M. Bougé, L. Priol, T. 2007 Book Chapter PeerReviewed application/pdf en http://irep.iium.edu.my/712/1/Securing_Sensor_Reports.pdf Pathan, Al-Sakib Khan and Hong, Choong Seon (2007) Securing sensor reports in wireless sensor networks. In: Lecture Notes in Computer Science (LNCS). Springer-Verlag, Berlin, Germany, pp. 881-890. http://www.springerlink.com/content/bn366014r31r2214/ DOI: 10.1007/978-3-540-74466-5_95 |
| spellingShingle | Q Science (General) QA76 Computer software Pathan, Al-Sakib Khan Hong, Choong Seon Securing sensor reports in wireless sensor networks |
| title | Securing sensor reports in wireless sensor networks |
| title_full | Securing sensor reports in wireless sensor networks |
| title_fullStr | Securing sensor reports in wireless sensor networks |
| title_full_unstemmed | Securing sensor reports in wireless sensor networks |
| title_short | Securing sensor reports in wireless sensor networks |
| title_sort | securing sensor reports in wireless sensor networks |
| topic | Q Science (General) QA76 Computer software |
| url | http://irep.iium.edu.my/712/ http://irep.iium.edu.my/712/ http://irep.iium.edu.my/712/ http://irep.iium.edu.my/712/1/Securing_Sensor_Reports.pdf |