Message integrity model for wireless sensor networks

Thumbnail Image
Date
2009-01-01
Authors
Qleibo, Haider
Major Professor
Advisor
Doug Jacobson
Committee Member
Journal Title
Journal ISSN
Volume Title
Publisher
Altmetrics
Authors
Research Projects
Organizational Units
Journal Issue
Is Version Of
Versions
Series
Department
Electrical and Computer Engineering
Abstract

WSNs are susceptible to a variety of attacks. These attacks vary in the way they are performed and executed; they include but not limited to node capture, physical tampering, denial of service, and message alteration. It is of paramount importance to protect gathered data by WSNs and defend the network against illegal access and malicious insertion of data that would alter the entire integrity of the system. The severe resource constraints in each sensor make it a challenge to secure the network. The need for new security ideas was the main inspiration and motivation of this research. While there has been a remarkable progress in many enabling technologies for sensor networking, the integrity of information received by the system has received less attention [50]. For instance, while many methods have been developed for self-organizing the network functions, less attention was paid to ensure high data integrit

Comments
Description
Keywords
Citation
Source
Copyright
Thu Jan 01 00:00:00 UTC 2009