Data Integrity Protocol for Sensor Networks

Durresi, Arjan; Paruchuri, Vamsi; kannan, Rajgopal; Iyengar, S. S.
June 2005
International Journal of Distributed Sensor Networks;2005, Vol. 1 Issue 2, p205
Academic Journal
In this paper, we present a novel lightweight protocol for data integrity in wireless sensor networks. Our protocol is based on a leapfrog strategy in which each cluster head verifies if its previous node has preserved the integrity of the packet using the secret key it shares with two hop uptree nodes. The proposed protocol is simple. The analysis and simulation results show that the protocol needs very few header bits, as low as three bits, thus resulting in negligible bandwidth overhead; the protocol poses very low computational overhead, it needs to compute just a hash as compared to multiple complex operations required by any cryptographic implementation for verifying authenticity.


Related Articles

  • At what price security? Koren, Rami // Portable Design;Apr2005, Vol. 11 Issue 4, p12 

    Portable devices are being used to store and play high-value content and serving as payment platforms for content on the devices themselves and for other types of micro- and mini-payments. With the increased bandwidth enabled by the 3G network, this trend continues to gain momentum. In this...

  • Survey finds IT leaders spend too much time restoring connections. Mohamed, Arif // Computer Weekly;3/29/2005, p35 

    The article focuses on a survey that reveals that 32% of IT executives spend time managing their networks. The inability to identify network faults affects continuity of service. Senior IT executives are spending one or more days each week managing aspects of their wide area network they would...

  • The promise of broadband wireless. Doucet, Keith // Broadcast Engineering;Dec2004, Vol. 46 Issue 12, p36 

    The article presents information on broadband wireless technology. Broadband wireless technology has resolved many of the signal and performance problems. Technology features available in today's systems now enable broadcasters to embrace unhampered, reliable broadband wireless communications in...

  • Broadcasting scheme with low client buffers and bandwidths for video-on-demand applications. Hsiang-Fu Yu; Hung-Chang Yang; Yao-Tien Wang; Ping-Lin Fan; Chu-Yi Chien // Multimedia Tools & Applications;May2009, Vol. 42 Issue 3, p295 

    Abstract  Efficient data broadcasting is independent of request arrivals, and is thus highly promising when transmitting popular videos. A conventionally adopted broadcasting method is periodic broadcasting, which divides a popular video into segments, which are then simultaneously...

  • Improving Adaptability and Per-Core Performance of Many-Core Processors Through Reconfiguration. Suri, Tameesh; Aggarwal, Aneesh // International Journal of Parallel Programming;Jun2010, Vol. 38 Issue 3/4, p203 

    Increasing the number of cores in a multi-core processor can only be achieved by reducing the resources available in each core, and hence sacrificing the per-core performance. Furthermore, having a large number of homogeneous cores may not be effective for all the applications. For instance,...

  • Bandwidth efficient MT-DS-SS via reduced subcarrier frequency spacing. Indranil Sen; David Matolak // Wireless Personal Communications;Dec2007, Vol. 43 Issue 4, p1419 

    Abstract  We investigate modifications to conventional multitone direct-sequence spread spectrum (MT-DS-SS) signaling to improve spectral efficiency, for high-data-rate systems with small processing gain. Reduction in subcarrier frequency spacing to half the symbol rate improves bandwidth...

  • An approximate analytical framework for performance analysis of equal gain combining technique over independent Nakagami, Rician and Weibull fading channels. Hossein Samimi; Paeiz Azmi // Wireless Personal Communications;Dec2007, Vol. 43 Issue 4, p1399 

    Abstract  In this paper, an approximate analytical method for performance analysis of equal gain combiner (EGC) receiver over independent Nakagami and Rician fading channels is presented. We use a convergent infinite series approach which makes it possible to describe the probability of...

  • Bandwidth Analysis and Simulation of Reliable Multicast Transport Protocols. Christian Maihöfer // Telecommunication Systems;Jun2003, Vol. 23 Issue 1/2, p201 

    In this paper, an analytical bandwidth evaluation of generic reliable multicast protocols is presented. Our analysis is based on a realistic system model, including data packet and control packet loss, asynchronous local clocks and imperfect scope-limited local groups. Of particular importance...

  • Theoretical analysis of the SABUL congestion control algorithm. Phoemphun Oothongsap; Yannis Viniotis; Mladen Vouk // Telecommunication Systems;Mar2006, Vol. 31 Issue 2/3, p115 

    Several new protocols such as RBUDP, User-Level UDP, Tsunami, and SABUL, have been proposed as alternatives to TCP for high speed data transfer. The purpose of this paper is to analyze the effects of SABUL congestion control algorithm on SABUL performance metrics such as bandwidth utilization,...


Read the Article

Courtesy of

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics