Abstract
We propose a novel mechanism for authentication of queries in a sensor network in case these queries are flooded. In our protocol, the base station appends an authenticator to every query, such that each sensor can verify with certain probability that the query is sent by the base station. Implicit cooperation between sensor nodes during the flooding process ensures that legitimate queries propagate quickly in the network, whereas the propagation of illegitimate queries is limited to only a small part of the network. © 2006 International Federation for Information Processing.
Cite
CITATION STYLE
Benenson, Z., Freiling, F. C., Hammerschmidt, E., Lucks, S., & Pimenidis, L. (2006). Authenticated query flooding in sensor networks. IFIP International Federation for Information Processing, 201, 38–49. https://doi.org/10.1007/0-387-33406-8_4
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.