Adaptive protocols for information dissemination in wireless sensor networks
MobiCom '99 Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking
Next century challenges: scalable coordination in sensor networks
MobiCom '99 Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking
SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
Cryptography and Network Security: Principles and Practice
Cryptography and Network Security: Principles and Practice
LEAP: efficient security mechanisms for large-scale distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
TOSSIM: accurate and scalable simulation of entire TinyOS applications
Proceedings of the 1st international conference on Embedded networked sensor systems
Timing-sync protocol for sensor networks
Proceedings of the 1st international conference on Embedded networked sensor systems
SIA: secure information aggregation in sensor networks
Proceedings of the 1st international conference on Embedded networked sensor systems
Gathering correlated data in sensor networks
Proceedings of the 2004 joint workshop on Foundations of mobile computing
TinySec: a link layer security architecture for wireless sensor networks
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
Evaluation of Security Mechanisms in Wireless Sensor Networks
ICW '05 Proceedings of the 2005 Systems Communications
NSDI'05 Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation - Volume 2
Resilient rights protection for sensor streams
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
Accurate time synchronization for wireless sensor networks
MSN'05 Proceedings of the First international conference on Mobile Ad-hoc and Sensor Networks
Exploring message authentication in sensor networks
ESAS'04 Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks
Secure hierarchical data aggregation in wireless sensor networks
WCNC'09 Proceedings of the 2009 IEEE conference on Wireless Communications & Networking Conference
Simplified watermarking scheme for sensor networks
International Journal of Internet Protocol Technology
Semi-fragile watermark for sensor data
International Journal of Internet Protocol Technology
Proceedings of the 10th International Conference on Advances in Mobile Computing & Multimedia
Hi-index | 0.02 |
When data are generated in sensor networks, high-speed data streams travel through the network. Traditional security approaches are often unable to keep up with the rates of the streams or they introduce overhead, which shortens the life of the network. The approach proposed in this paper is one that solves the problems posed above. By embedding a one-time pad, the actual value is distorted enough to make any information gleaned from eavesdropping useless to an attacker. The use of the one-time pad ensures that the data were indeed received from a particular sensor, and it gives adequate protection against injected messages. The simulation shows this approach provides security with negligible overhead while the throughput is similar to the same network without security.