Statistical En-route Detection and Filtering of Injected False Data in Sensor Networks

نویسندگان

  • Fan Ye
  • Haiyun Luo
  • Songwu Lu
  • Lixia Zhang
چکیده

In a large-scale sensor network individual sensors are subject to security compromises. A compromised node can inject bogus sensing reports into the network. If undetected, these bogus reports would be forwarded to the data collection point (i.e. the sink). Such attacks by compromised sensors can cause not only false alarms but also the depletion of the finite amount of energy in a battery powered network. In this paper we present a Statistical Enroute Filtering (SEF) mechanism that can detect and drop such false reports. SEF requires that each sensing report be validated by multiple keyed message authentication codes (MACs), each generated by a node that detects the same event. As the report is forwarded, each node along the way verifies the correctness of the MACs probabilistically and drops those with invalid MACs at earliest points. The sink further filters out remaining false reports that escape the en-route filtering. SEF exploits the network scale to determine the truthfulness of each report through collective decision-making by multiples detecting nodes and collective false-report-detection by multiple forwarding nodes. Our analysis and simulations show that, with an overhead of 14 bytes per report, SEF is able to drop 80 90% falsely injected reports by a compromised node within 10 forwarding hops.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Path Selection Method for the Statistical Filtering-Based Sensor Networks Using a Security Evaluation Function

Sungkyunkwan University, Suwon 440-740, South Korea Summary Many sensor network applications are dependent on the secure operation of sensor networks, and will have serious consequences if the network is compromised or disrupted. Fabricated reports can be injected through compromised nodes, which can lead not only to false alarms but also to the depletion of limited energy resources in battery ...

متن کامل

A Path Selection Method for Improving the Detection Power of Statistical Filtering in Sensor Networks

In many sensor network applications, sensor nodes are deployed in unattended environments, and hence are vulnerable to physical attacks, potentially compromising the node’s cryptographic keys. False sensing reports can be injected through compromised nodes, which can lead to not only false alarms but also the depletion of limited energy resources in battery powered networks. Ye et al. [4] propo...

متن کامل

Cooperative Bit-Compressed Authentication Scheme against Compromised Node Attacks in Wireless Sensor Networks

Sensor nodes deployed at hostile environments suffer compromise node attacks, in which an adversary injects counterfeit data into the sink causing error detection at upper level and energy wastage in en-route sensor nodes. A novel authentication scheme known as, Cooperative BitCompressed Authentication (CBA) is based on random graph characteristic of sensor node deployment and a cooperative bit...

متن کامل

BECAN: A Bandwidth Efficient Cooperative Authentication Scheme for Wireless Sensor Networks

This paper propose a bandwidth-efficient cooperative authentication (BECAN) scheme for filtering injected false data in Wireless sensor Networks. Sensor node could be easily compromised as the attacker can gain control obtain key values and change the properties of the node. This results in an false report to sink and energy waste in en-route nodes. The proposed BECAN scheme can save energy by ...

متن کامل

BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data using timer in Wireless Sensor Networks

Injecting false data attack is a well-known serious threat to wireless sensor network, for which an adversary reports bogus information to sink causing error decision at upper level and energy waste in en-route nodes. In this paper, we propose a novel bandwidth-efficient cooperative authentication (BECAN) scheme for filtering injected false data. This uses fixed timer to filter the packets in p...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004