Download now Free registration required
In this paper, the authors discuss how to design secure data transmission protocol in wireless sensor networks. The network is assumed to have p sensors and n - p routers which relay the observations from the sensors to the fusion center. A maximum of f routers can be compromised by an adversary. The fusion center wants to detect and identify malicious nodes in the system and reconstruct the observations. Due to computational constraints, they could not use advance information security technique, such as digital signature to protect the integrity of the data. Instead, they model the whole network as a linear system.
- Format: PDF
- Size: 109.12 KB