Constrained Function Based En-Route Filtering for Sensor Networks
نویسندگان
چکیده
Sensor networks are vulnerable to false data injection attack and path-based DoS (PDoS) attack. While conventional authentication schemes are insufficient for solving these security conflicts, an en-route filtering scheme acts as a defense against these two attacks. To construct an efficient en-route filtering scheme, this paper first presents a Constrained Function based message Authentication (CFA) scheme, which can be thought of as a hash function directly supporting the en-route filtering functionality. Together with the redundancy property of sensor networks, which means that an event can be simultaneously observed by multiple sensor nodes, the devised CFA scheme is used to construct a CFA-based en-route filtering (CFAEF) scheme. In contrast to most of the existing methods, which rely on complicated security associations among sensor nodes, our design, which directly exploits an en-route filtering hash function, appears to be novel. We examine the CFA and CFAEF schemes from both the theoretical and numerical aspects to demonstrate their efficiency and effectiveness. keywords: Sensor Networks, Authentication, En-route Filtering, Security Chia-Mu Yu ([email protected]) is with National Taiwan University and Academia Sinica. Chun-Shien Lu ([email protected]) is with Academia Sinica. Sy-Yen Kuo ([email protected]) is with National Taiwan University. Corresponding author: Chun-Shien Lu
منابع مشابه
Energy Efficiency and Reliability in Underwater Wireless Sensor Networks Using Cuckoo Optimizer Algorithm
Energy efficiency and reliability are widely understood to be one of the dominant considerations for Underwater Wireless Sensor Networks (UWSNs). In this paper, in order to maintain energy efficiency and reliability in a UWSN, Cuckoo Optimization Algorithm (COA) is adopted that is a combination of three techniques of geo-routing, multi-path routing, and Duty-Cycle mechanism. In the proposed alg...
متن کاملCooperative Bit-Compressed Authentication Scheme against Compromised Node Attacks in Wireless Sensor Networks
Sensor nodes deployed at hostile environments suffer compromise node attacks, in which an adversary injects counterfeit data into the sink causing error detection at upper level and energy wastage in en-route sensor nodes. A novel authentication scheme known as, Cooperative BitCompressed Authentication (CBA) is based on random graph characteristic of sensor node deployment and a cooperative bit...
متن کاملA Threshold Determining Method for the Dynamic Filtering in Wireless Sensor Networks Based on Fuzzy Logic
Sungkyunkwan University, Suwon 440-746, Republic of Korea Summary In sensor networks, nodes can be easily compromised by an adversary because of hostile environments. An adversary may use compromised nodes to inject false reports into the network. The dynamic en-route scheme for filtering false data injection can detect and drop such false reports during the forwarding phase. In this scheme, ch...
متن کاملAnalysis of En-route Filtering Scheme for Information Reporting in Wireless Sensor Networks
In wireless sensor networks, adversaries can injectfalse data reports via compromised nodes and launch DoS attacks against legitimate reports. Recently, a number of filtering schemes against false reports have been proposed. However, they either lack strong filtering capacity or cannot support highly dynamic sensor networks very well. Moreover, few of them can deal with DoS attacks simultaneous...
متن کاملBECAN: A Bandwidth Efficient Cooperative Authentication Scheme for Wireless Sensor Networks
This paper propose a bandwidth-efficient cooperative authentication (BECAN) scheme for filtering injected false data in Wireless sensor Networks. Sensor node could be easily compromised as the attacker can gain control obtain key values and change the properties of the node. This results in an false report to sink and energy waste in en-route nodes. The proposed BECAN scheme can save energy by ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/0911.4239 شماره
صفحات -
تاریخ انتشار 2009