Constrained Function Based En-Route Filtering for Sensor Networks

نویسندگان

  • Chia-Mu Yu
  • Chun-Shien Lu
  • Sy-Yen Kuo
چکیده

Sensor networks are vulnerable to false data injection attack and path-based DoS (PDoS) attack. While conventional authentication schemes are insufficient for solving these security conflicts, an en-route filtering scheme acts as a defense against these two attacks. To construct an efficient en-route filtering scheme, this paper first presents a Constrained Function based message Authentication (CFA) scheme, which can be thought of as a hash function directly supporting the en-route filtering functionality. Together with the redundancy property of sensor networks, which means that an event can be simultaneously observed by multiple sensor nodes, the devised CFA scheme is used to construct a CFA-based en-route filtering (CFAEF) scheme. In contrast to most of the existing methods, which rely on complicated security associations among sensor nodes, our design, which directly exploits an en-route filtering hash function, appears to be novel. We examine the CFA and CFAEF schemes from both the theoretical and numerical aspects to demonstrate their efficiency and effectiveness. keywords: Sensor Networks, Authentication, En-route Filtering, Security Chia-Mu Yu ([email protected]) is with National Taiwan University and Academia Sinica. Chun-Shien Lu ([email protected]) is with Academia Sinica. Sy-Yen Kuo ([email protected]) is with National Taiwan University. Corresponding author: Chun-Shien Lu

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Energy Efficiency and Reliability in Underwater Wireless Sensor Networks Using Cuckoo Optimizer Algorithm

Energy efficiency and reliability are widely understood to be one of the dominant considerations for Underwater Wireless Sensor Networks (UWSNs). In this paper, in order to maintain energy efficiency and reliability in a UWSN, Cuckoo Optimization Algorithm (COA) is adopted that is a combination of three techniques of geo-routing, multi-path routing, and Duty-Cycle mechanism. In the proposed alg...

متن کامل

Cooperative Bit-Compressed Authentication Scheme against Compromised Node Attacks in Wireless Sensor Networks

Sensor nodes deployed at hostile environments suffer compromise node attacks, in which an adversary injects counterfeit data into the sink causing error detection at upper level and energy wastage in en-route sensor nodes. A novel authentication scheme known as, Cooperative BitCompressed Authentication (CBA) is based on random graph characteristic of sensor node deployment and a cooperative bit...

متن کامل

A Threshold Determining Method for the Dynamic Filtering in Wireless Sensor Networks Based on Fuzzy Logic

Sungkyunkwan University, Suwon 440-746, Republic of Korea Summary In sensor networks, nodes can be easily compromised by an adversary because of hostile environments. An adversary may use compromised nodes to inject false reports into the network. The dynamic en-route scheme for filtering false data injection can detect and drop such false reports during the forwarding phase. In this scheme, ch...

متن کامل

Analysis of En-route Filtering Scheme for Information Reporting in Wireless Sensor Networks

In wireless sensor networks, adversaries can injectfalse data reports via compromised nodes and launch DoS attacks against legitimate reports. Recently, a number of filtering schemes against false reports have been proposed. However, they either lack strong filtering capacity or cannot support highly dynamic sensor networks very well. Moreover, few of them can deal with DoS attacks simultaneous...

متن کامل

BECAN: A Bandwidth Efficient Cooperative Authentication Scheme for Wireless Sensor Networks

This paper propose a bandwidth-efficient cooperative authentication (BECAN) scheme for filtering injected false data in Wireless sensor Networks. Sensor node could be easily compromised as the attacker can gain control obtain key values and change the properties of the node. This results in an false report to sink and energy waste in en-route nodes. The proposed BECAN scheme can save energy by ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/0911.4239  شماره 

صفحات  -

تاریخ انتشار 2009