Authenticated Broadcast in Heterogeneous Wireless Sensor Networks Using Chinese Remainder Theorem Algorithm

Date Added: Jun 2011
Format: PDF

Wireless Sensor Networks (WSN's) are quite useful in many applications since they provide a cost effective solution to many real life problems. But it appears that they are more prone to attacks than wired networks .They are susceptible to a variety of attacks, including node capture, physical tampering and denial of service, prompting a range of fundamental research challenges, an attacker can easily eavesdrop on, inject or alter the data transmitted between sensor nodes. Security allows WSNs to be used with confidence and maintains integrity of data. Providing security in wireless sensor networks is pivotal due to the fact that sensor nodes are inherently limited by resources such as power, bandwidth, computation and storage.