Authenticated Broadcast in Heterogeneous Wireless Sensor Networks Using Chinese Remainder Theorem Algorithm

Wireless Sensor Networks (WSN's) are quite useful in many applications since they provide a cost effective solution to many real life problems. But it appears that they are more prone to attacks than wired networks .They are susceptible to a variety of attacks, including node capture, physical tampering and denial of service, prompting a range of fundamental research challenges, an attacker can easily eavesdrop on, inject or alter the data transmitted between sensor nodes. Security allows WSNs to be used with confidence and maintains integrity of data. Providing security in wireless sensor networks is pivotal due to the fact that sensor nodes are inherently limited by resources such as power, bandwidth, computation and storage.

Provided by: Science Publications Topic: Mobility Date Added: Jun 2011 Format: PDF

Find By Topic