z-logo
open-access-imgOpen Access
A location‐based naming mechanism for securing sensor networks
Author(s) -
Zhou Yun,
Fang Yuguang
Publication year - 2006
Publication title -
wireless communications and mobile computing
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.42
H-Index - 64
eISSN - 1530-8677
pISSN - 1530-8669
DOI - 10.1002/wcm.400
Subject(s) - identifier , computer science , node (physics) , computer network , wireless sensor network , authentication (law) , identification (biology) , dimension (graph theory) , service (business) , sensor node , network topology , topology (electrical circuits) , computer security , key distribution in wireless sensor networks , telecommunications , wireless network , wireless , botany , mathematics , structural engineering , economy , combinatorics , pure mathematics , engineering , economics , biology
Conventional sensor networks name every node with an identifier from a one dimension name space that has no meaning but identification function. However, it is much useful to let every node identifier carry more characteristics of the node itself. This paper introduces the naming problem for sensor networks in the literature for the first time, and proposes a location‐based naming mechanism (LBN) for sensor networks, in which location information is embedded into node identifier and acts as an inherent node characteristic to provide authentication service in local access control. When LBN is enforced, the impacts of many attacks to sensor network topology can be limited in a small area. A link layer authentication (LLA) scheme is also proposed to further decrease the impacts of those attacks. Our LBN and LLA can be combined and act as an efficient solution against a wide range of attacks in sensor networks. Copyright © 2006 John Wiley & Sons, Ltd.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here