LEAP: efficient security mechanisms for large-scale distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Multilevel μTESLA: Broadcast authentication for distributed sensor networks
ACM Transactions on Embedded Computing Systems (TECS)
Proceedings of the 4th ACM workshop on Wireless security
SensEye: a multi-tier camera sensor network
Proceedings of the 13th annual ACM international conference on Multimedia
Reducing ıTESLA memory requirements
ICSNC '07 Proceedings of the Second International Conference on Systems and Networks Communications
Proceedings of the 6th ACM workshop on QoS and security for wireless and mobile networks
Hi-index | 0.00 |
Wireless sensor network (WSN) is usually used in civil and military applications for gathering data from the surrounding environment. As WSN is a self configured network and mostly works in an unattended wireless environment, there is a lot of scope for the adversaries to tamper the sensed data as well as may try to alter the underlying working principle of the network. Several factors like, physical exposure of the sensor nodes to the adversaries, the ad-hoc network infrastructure etc. makes WSN more prone to security threats. Providing security solution to the WSN is again a difficult task due to inherent constraints associated with the sensor nodes like, limited processing power, smaller memory and fixed battery power. Security solutions based on public key cryptography are not usually recommended for WSN because of comparatively more computational cost. In this paper we have analyzed different security threats associated with the energy efficient data gathering protocol HCEPSN and proposed a symmetric key based security solution to it.