A neighbor information based false data filtering scheme in wireless sensor networks

Zhi-xiong Liu , Jian-xin Wang , Shi-geng Zhang

Journal of Central South University ›› 2012, Vol. 19 ›› Issue (11) : 3147 -3153.

PDF
Journal of Central South University ›› 2012, Vol. 19 ›› Issue (11) : 3147 -3153. DOI: 10.1007/s11771-012-1389-3
Article

A neighbor information based false data filtering scheme in wireless sensor networks

Author information +
History +
PDF

Abstract

In sensor networks, the adversaries can inject false data reports from compromised nodes. Previous approaches to filter false reports, e.g., SEF, only verify the correctness of the message authentication code (MACs) carried in each data report on intermediate nodes, thus cannot filter out fake reports that are forged in a collaborative manner by a group of compromised nodes, even if these compromised nodes distribute in different geographical areas. Furthermore, if the adversary obtains keys from enough (e.g., more than t in SEF) distinct key partitions, it then can successfully forge a data report without being detected en-route. A neighbor information based false report filtering scheme (NFFS) in wireless sensor networks was presented. In NFFS, each node distributes its neighbor information to some other nodes after deployment. When a report is generated for an observed event, it must carry the IDs and the MACs from t detecting nodes. Each forwarding node checks not only the correctness of the MACs carried in the report, but also the legitimacy of the relative position of these detecting nodes. Analysis and simulation results demonstrate that NFFS can resist collaborative false data injection attacks efficiently, and thus can tolerate much more compromised nodes than existing schemes.

Keywords

wireless sensor network / false report filtering / neighbor information / collaborative attack / compromise tolerance

Cite this article

Download citation ▾
Zhi-xiong Liu, Jian-xin Wang, Shi-geng Zhang. A neighbor information based false data filtering scheme in wireless sensor networks. Journal of Central South University, 2012, 19(11): 3147-3153 DOI:10.1007/s11771-012-1389-3

登录浏览全文

4963

注册一个新账户 忘记密码

References

[1]

RenF.-y., HuangH.-n., LinChuang.. Wireless sensor networks [J]. Journal of Software, 2003, 14(7): 1282-1291

[2]

PeiZ.-q., XuC.-q., TengJin.. Node scattering manipulation based on trajectory model in wireless sensor network [J]. Journal of Central South University of Technology, 2010, 17(5): 991-999

[3]

SuZ., LinC., FengF.-j., RenF.-yuan.. Key management schemes and protocols for wireless sensor networks [J]. Journal of Software, 2007, 18(5): 1218-1231

[4]

YE Fan, LUO Hai-yun, LU Song-wu, ZHANG Li-xia. Statistical en-route filtering of injected false data in sensor networks [C]// Proceedings of 23th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM’ 04). Hong Kong, China, 2004: 2446–2457.

[5]

ZHU Sen-cun, SETIA S, JAJODIA S. An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks [C]// Proceeding IEEE symposium on Security and privacy (S&P’ 04). California, USA, 2004: 259–271.

[6]

YU ZHEN, GUAN Yong. A dynamic en-route scheme for filtering false data injection in wireless sensor networks [C]// Proceedings of 25th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM’ 06). Barcelona, Spain, 2006: 1–12.

[7]

LI Yu, LI Jiang-zhong. Grouping-based resilient statistical en-route filtering for sensor networks [C]// Proceedings of 28th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2009). Rio de Janeiro, Brazil, 2009: 1782–1790.

[8]

YANG Hao, LU Song-wu. Commutative cipher based en-route filtering in wireless sensor networks [C]// Vehicular Technology Conference (VTC’ 04). Los Angeles, USA, 2004: 1223–1227.

[9]

WANG Hao-dong, LI Qun. PDF:A public-key based false data filtering scheme in sensor networks [C]// Proceedings of the International Conference on Wireless Algorithms, Systems and Applications (WASA’ 07). Chicago, USA, 2007: 129–138.

[10]

AYDAY E, DELGOSHA F, FEKRI F. Location-aware security services for wireless sensor networks using network coding [C]// Proceedings of the IEEE Conference on Computing and Communicating (INFOCOM’ 07). Alaska, USA, 2007: 1226–1234.

[11]

REN Kui, LOU Wen-jing, ZHANG Yan-chao. Providing location-aware end-to-end data security in wireless sensor networks [C]// Proceedings of the IEEE Conference on Computing and Communicating (INFOCOM’ 06). Barcelona, Spain, 2006: 585–598.

[12]

LI Feng, SRINIVASAN A, WU Jie. A probabilistic voting-based filtering scheme in wireless sensor networks [C]// Proceedings of the International Wireless Communications and Mobile Computing Conference (IWCMC’ 06). Vancouver, Canada, 2006: 255–265.

[13]

MiaoMa.. Resilience of sink filtering scheme in wireless sensor networks [J]. Computer Communications, 2006, 30(1): 55-65

AI Summary AI Mindmap
PDF

129

Accesses

0

Citation

Detail

Sections
Recommended

AI思维导图

/