BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected
#1

Abstract—Injecting false data attack is a well known serious threat to wireless sensor network, for which an adversary reports bogus information to sink causing error decision at upper level and energy waste in en-route nodes. In this paper, we propose a novel bandwidth-efficient cooperative authentication (BECAN) scheme for filtering injected false data. Based on the random graph characteristics of sensor node deployment and the cooperative bit-compressed authentication technique, the proposed BECAN scheme can save energy by early detecting and filtering the majority of injected false data with minor extra overheads at the en-route nodes. In addition, only a very small fraction of injected false data needs to be checked by the sink, which thus largely reduces the burden of the sink. Both theoretical and simulation results are given to demonstrate the effectiveness of the proposed scheme in terms of high filtering probability and energy saving.
projects9.com
Phone : +91-9618855666
+91-8008855666
Email : projects[at]projects9.com
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: seminar report on topic authentication scheme, which layer used in bandwidth efficient cooperative authentication scheme for filtering injected false data in wireless senso, kevin becan, water injected six strokr engine, literature survey for becan a bandwidth efficient cooperative authentication scheme for filtering injected false data in wire, becan scheme full report, report of a distributed key management framework using cooperative message authentication in vanets,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Graphical Password Authentication using Cued Click Points (CCP) project topics 19 18,480 26-04-2017, 03:38 PM
Last Post: jaseela123d
  Critical State-Based Filtering System for Securing SCADA Network Protocols 1 843 14-02-2017, 12:48 PM
Last Post: jaseela123d
  An Efficient Algorithm for Mining Frequent Patterns full report project topics 3 4,722 01-10-2016, 10:02 AM
Last Post: Guest
  Data Hiding in Binary Images for Authentication & Annotation project topics 2 1,819 06-11-2015, 02:27 PM
Last Post: seminar report asees
  Cooperative Caching in Wireless P2P Networks: Design, Implementation, and Evaluation seminar class 2 3,296 02-02-2013, 02:08 PM
Last Post: seminar details
  Efficient Graph-Based Image Segmentation seminar class 2 3,329 02-02-2013, 01:58 PM
Last Post: seminar details
  Efficient Broadcasting in Mobile Ad Hoc Networks project report tiger 11 9,996 20-12-2012, 12:30 PM
Last Post: seminar details
  Energy-Efficient Routing in Mobile Ad Hoc Networks: Mobility-Assisted Case (Java) project topics 1 1,738 12-11-2012, 12:42 PM
Last Post: seminar details
  Improved Offline Signature Verification Scheme Using Feature Point Extra ction Method seminar class 1 3,077 24-10-2012, 01:27 PM
Last Post: seminar details
  Hop-by-Hop Routing in Wireless Mesh Networks with Bandwidth Guarantees Projects9 1 1,171 07-10-2012, 08:26 PM
Last Post: ebe.joseph

Forum Jump: