A Novel En-route Filtering Scheme against False Data Injection Attacks in Cyber-Physical Systems
نویسندگان
چکیده
In Cyber-Physical System (CPS), attackers could inject false measurements to the controller through compromised sensor nodes, which not only threaten the security of the system, but also consumes significant network resources. To deal with this issue, a number of en-route filtering schemes have been designed for wireless sensor networks. However, these schemes either lack resilience to the number of compromised nodes or depend on the statically configured routes and node localization, which are not suitable for CPS. In this paper, we propose a Polynomialbased Compromised-Resilient En-route Filtering scheme (PCREF), which can filter false injected data effectively and achieve a high resilience to the number of compromised nodes without relying on static routes and node localization. Different from the existing schemes, PCREF uses polynomials instead of MACs for endorsing measurement reports to achieve the resilience to attacks. Each node stores two types of polynomials: authentication polynomial and check polynomial derived from the primitive polynomial, and used for endorsing and verifying the measurement reports. Through extensive theoretical analysis and simulation experiments, our data show that our scheme achieves better filtering capacity and resilience to the large number of compromised nodes in comparison with the existing schemes. Keywords—Cyber-Physical system, false measurement report, sensor node, polynomial-based en-route filtering
منابع مشابه
Resilient Configuration of Distribution System versus False Data Injection Attacks Against State Estimation
State estimation is used in power systems to estimate grid variables based on meter measurements. Unfortunately, power grids are vulnerable to cyber-attacks. Reducing cyber-attacks against state estimation is necessary to ensure power system safe and reliable operation. False data injection (FDI) is a type of cyber-attack that tampers with measurements. This paper proposes network reconfigurati...
متن کاملConstrained Function Based En-Route Filtering for Sensor Networks
Sensor networks are vulnerable to false data injection attack and path-based DoS (PDoS) attack. While conventional authentication schemes are insufficient for solving these security conflicts, an en-route filtering scheme acts as a defense against these two attacks. To construct an efficient en-route filtering scheme, this paper first presents a Constrained Function based message Authentication...
متن کاملAnalysis of En-route Filtering Scheme for Information Reporting in Wireless Sensor Networks
In wireless sensor networks, adversaries can injectfalse data reports via compromised nodes and launch DoS attacks against legitimate reports. Recently, a number of filtering schemes against false reports have been proposed. However, they either lack strong filtering capacity or cannot support highly dynamic sensor networks very well. Moreover, few of them can deal with DoS attacks simultaneous...
متن کاملA Path Selection Method for Improving the Detection Power of Statistical Filtering in Sensor Networks
In many sensor network applications, sensor nodes are deployed in unattended environments, and hence are vulnerable to physical attacks, potentially compromising the node’s cryptographic keys. False sensing reports can be injected through compromised nodes, which can lead to not only false alarms but also the depletion of limited energy resources in battery powered networks. Ye et al. [4] propo...
متن کاملAn Enhanced Detection and Energy- Efficient En-route Filtering Scheme in Wireless Sensor Networks
Wireless sensor networks (WSNs), due to their small size, low cost, and untethered communication over a short-range, have great potential for applications and services. Due to hostile environments and an unattended nature, they are prone to many types of attacks by adversaries. False data injection attacks compromise data accuracy at the sink node and cause undesirable energy depletion at the s...
متن کامل