期刊名称:International Journal of Computer Trends and Technology
电子版ISSN:2231-2803
出版年度:2013
卷号:4
期号:4-2
出版社:Seventh Sense Research Group
摘要:Wireless sensor networks are vulnerable to many types of security attacks, including false data injection, data forgery, and eavesdropping. Sensor nodes can be compromised by intruders, and the compromised nodes can distort data integrity by injecting false data. False data can be injected by compromised sensor nodes in various ways, including data aggregation and relaying. Data confidentiality prefers data to be encrypted at the source node and decrypted at the destination. However, data aggregation techniques usually require any encrypted sensor data to be decrypted at data aggregators for aggregation. The basic idea behind the false data detection algorithm is to form pairs of sensor nodes such that one pair computes a message authentication code (MAC) of forwarded data and the other pair mate later verifies the data using the MAC. Data aggregation is implemented in wireless sensor networks to eliminate data redundancy, reduce data transmission, and improve data accuracy.
关键词:Data aggregation and authentication protocol (DAA); Data integrity; network-level security; Message Authentication Code(MAC) and Sensor networks