Wireless sensor networks: a survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
Wireless Sensor Networks: Architectures and Protocols
Wireless Sensor Networks: Architectures and Protocols
PDF: A Public-key based False Data Filtering Scheme in Sensor Networks
WASA '07 Proceedings of the International Conference on Wireless Algorithms,Systems and Applications
Short Hash-Based Signatures for Wireless Sensor Networks
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
Location-based compromise-tolerant security mechanisms for wireless sensor networks
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
Wireless Sensor Networks (WSN) consist of a large number of sensor nodes equipped with limited computational capacity, memory and battery energy. As sensor nodes in WSN deployed in a hostile and unattended environment, the networks is susceptible to various malicious threats. False data injection is one of them. An adversary may attempt to inject false data containing non-existent events through some compromised nodes causing false alarms at the base station and draining out energy of forwarding nodes. As a result, detection of false data injection in WSN is an important concern. This paper presents a scheme using hash-based short signatures for filtering false data injection in WSN.