A Novel En-route Filtering Scheme against False Data Injection Attacks in Cyber-Physical Systems

نویسندگان

  • Xinyu Yang
  • Jie Lin
  • Paul Moulema
  • Wei Yu
  • Xinwen Fu
  • Wei Zhao
چکیده

In Cyber-Physical System (CPS), attackers could inject false measurements to the controller through compromised sensor nodes, which not only threaten the security of the system, but also consumes significant network resources. To deal with this issue, a number of en-route filtering schemes have been designed for wireless sensor networks. However, these schemes either lack resilience to the number of compromised nodes or depend on the statically configured routes and node localization, which are not suitable for CPS. In this paper, we propose a Polynomialbased Compromised-Resilient En-route Filtering scheme (PCREF), which can filter false injected data effectively and achieve a high resilience to the number of compromised nodes without relying on static routes and node localization. Different from the existing schemes, PCREF uses polynomials instead of MACs for endorsing measurement reports to achieve the resilience to attacks. Each node stores two types of polynomials: authentication polynomial and check polynomial derived from the primitive polynomial, and used for endorsing and verifying the measurement reports. Through extensive theoretical analysis and simulation experiments, our data show that our scheme achieves better filtering capacity and resilience to the large number of compromised nodes in comparison with the existing schemes. Keywords—Cyber-Physical system, false measurement report, sensor node, polynomial-based en-route filtering

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Resilient Configuration of Distribution System versus False Data Injection Attacks Against State Estimation

State estimation is used in power systems to estimate grid variables based on meter measurements. Unfortunately, power grids are vulnerable to cyber-attacks. Reducing cyber-attacks against state estimation is necessary to ensure power system safe and reliable operation. False data injection (FDI) is a type of cyber-attack that tampers with measurements. This paper proposes network reconfigurati...

متن کامل

Constrained Function Based En-Route Filtering for Sensor Networks

Sensor networks are vulnerable to false data injection attack and path-based DoS (PDoS) attack. While conventional authentication schemes are insufficient for solving these security conflicts, an en-route filtering scheme acts as a defense against these two attacks. To construct an efficient en-route filtering scheme, this paper first presents a Constrained Function based message Authentication...

متن کامل

Analysis of En-route Filtering Scheme for Information Reporting in Wireless Sensor Networks

In wireless sensor networks, adversaries can injectfalse data reports via compromised nodes and launch DoS attacks against legitimate reports. Recently, a number of filtering schemes against false reports have been proposed. However, they either lack strong filtering capacity or cannot support highly dynamic sensor networks very well. Moreover, few of them can deal with DoS attacks simultaneous...

متن کامل

A Path Selection Method for Improving the Detection Power of Statistical Filtering in Sensor Networks

In many sensor network applications, sensor nodes are deployed in unattended environments, and hence are vulnerable to physical attacks, potentially compromising the node’s cryptographic keys. False sensing reports can be injected through compromised nodes, which can lead to not only false alarms but also the depletion of limited energy resources in battery powered networks. Ye et al. [4] propo...

متن کامل

An Enhanced Detection and Energy- Efficient En-route Filtering Scheme in Wireless Sensor Networks

Wireless sensor networks (WSNs), due to their small size, low cost, and untethered communication over a short-range, have great potential for applications and services. Due to hostile environments and an unattended nature, they are prone to many types of attacks by adversaries. False data injection attacks compromise data accuracy at the sink node and cause undesirable energy depletion at the s...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011