Proceedings of the 6th ACM International Workshop on Data Engineering for Wireless and Mobile Access 2007
DOI: 10.1145/1254850.1254853
|View full text |Cite
|
Sign up to set email alerts
|

Practical algorithm for data security (PADS) in wireless sensor networks

Abstract: When data are generated in sensor networks, high-speed data streams travel through the network. Traditional security approaches are often unable to keep up with the rates of the streams or they introduce overhead, which shortens the life of the network. The approach proposed in this paper is one that solves the problems posed above. By embedding a one-time pad, the actual value is distorted enough to make any information gleaned from eavesdropping useless to an attacker. The use of the one-time pad ensures tha… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
14
0

Year Published

2008
2008
2020
2020

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 19 publications
(14 citation statements)
references
References 16 publications
0
14
0
Order By: Relevance
“…digital watermarking) to guarantee the authenticity of the transmitted data as in models [22,[25][26][27]. However, these solutions mainly focused on the integrity of the transmitted data but they neglected the end-to-end privacy preservation of the sensitive information (i.e.…”
Section: Protection Technique Features Commentsmentioning
confidence: 99%
See 1 more Smart Citation
“…digital watermarking) to guarantee the authenticity of the transmitted data as in models [22,[25][26][27]. However, these solutions mainly focused on the integrity of the transmitted data but they neglected the end-to-end privacy preservation of the sensitive information (i.e.…”
Section: Protection Technique Features Commentsmentioning
confidence: 99%
“…protecting the integrity) where a small fixed-length message (e.g. MAC) is hidden inside the host data [22][23][24][25][26][27]. However, there are limitations in these digital watermarking techniques.…”
Section: Introductionmentioning
confidence: 99%
“…two wireless sensor nodes) are deployed with a shared secret by the BS. During data-sending process, the sender organizes data readings into elements of fixed size [4], and generates a message authentication codes (MAC) [5] for each data element, using the shared secret. Then it sends data elements and their MACs to the receiver.…”
Section: Introductionmentioning
confidence: 99%
“…Availability in sensor networks is of great concern to the user of the network. Unfortunately, many existing security primitives can not be used in sensor networks, either because the computing power of the sensors is too limited or the additional work created by the protocols causes excessive network traffic [4].…”
Section: Introductionmentioning
confidence: 99%