Hop-by-Hop Authentication Using Heuristicranking Method in In-Network Communication

Provided by: International Journal of Advanced Engineering Applications (IJAEA)
Topic: Security
Format: PDF
In a wireless sensor network individual sensors are subject to security compromises. A compromised node can inject bogus sensing reports and some drop the packets in the network. If undetected, these bogus reports would be forwarded to the data collection point (i.e. the sink). Such attacks by compromised sensors can cause not only false alarms but also the depletion of the finite amount of energy in a battery powered network. Here, the authors present a hop-by-hop authentication scheme that guarantees that the base station will detect any injected false data packets when certain nodes are compromised.

Find By Topic