Authenticated query flooding in sensor networks

8Citations
Citations of this article
9Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

We propose a novel mechanism for authentication of queries in a sensor network in case these queries are flooded. In our protocol, the base station appends an authenticator to every query, such that each sensor can verify with certain probability that the query is sent by the base station. Implicit cooperation between sensor nodes during the flooding process ensures that legitimate queries propagate quickly in the network, whereas the propagation of illegitimate queries is limited to only a small part of the network. © 2006 International Federation for Information Processing.

Cite

CITATION STYLE

APA

Benenson, Z., Freiling, F. C., Hammerschmidt, E., Lucks, S., & Pimenidis, L. (2006). Authenticated query flooding in sensor networks. IFIP International Federation for Information Processing, 201, 38–49. https://doi.org/10.1007/0-387-33406-8_4

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free