Bogus Data Filtering in Sensor Networks
نویسندگان
چکیده
Recently, Zhang et al. proposed a location-based thresholdendorsement scheme (LTE) to thwart bogus data injection attacks. This scheme exhibits much greater filtering power than earlier symmetric schemes and results in enhanced energy savings. In this paper, we show that LTE has a significant vulnerability. We also propose an improved scheme that mitigates this weakness and thereby achieves the original claims of Zhang et al. without lessening LTE’s remarkable filtering power.
منابع مشابه
Refining Bogus Data in Wireless Sensor Network Using Non Repudiation and Enrouting Filter Mechanism
Wireless sensor network is usually composed of a large number of sensor nodes which are interconnected through wireless links to perform distributed sensing tasks. When a sensor node generates report after being triggered by a special event, it will send the report to a data collection unit (also known as sink) through an established routing path. Wireless sensor networks are usually deployed a...
متن کاملMessage Authentication in Sensor Networks Using En-route Filtering
-------------------------------------------------------------------ABSTRACT---------------------------------------------------In a large-scale sensor network individual sensors are subject to security compromises. A compromised node can be used to inject bogus sensing reports. If undetected, these bogus reports would be forwarded to the data collection point (i.e. the sink).such attacks by comp...
متن کاملFiltering Injected False Data in Wireless Sensor Network Using Bandwidth Efficient Cooperative Authentication Scheme
www.ijeist.in Abstract— Wireless sensor networks are usually deployed at unattended or hostile environments. Therefore, they are very vulnerable to various security attacks, such as selective forwarding, wormholes, and Sybil attacks. In addition, wireless sensor networks may also suffer from Injecting false data attack. For an injecting false data attack, an adversary first compromises several ...
متن کاملAchieving robust message authentication in sensor networks: a public-key based approach
Given the extremely limited hardware resources on sensor nodes and the inclement deploying environment, the adversary Denial-of-Service (DoS) attack becomes a serious security threat toward wireless sensor networks. Without adequate defense mechanism, the adversary can simply inundate the network by flooding the bogus data packets, and paralyze the partial or whole sensor network by depleting n...
متن کاملStatistical En-route Detection and Filtering of Injected False Data in Sensor Networks
In a large-scale sensor network individual sensors are subject to security compromises. A compromised node can inject bogus sensing reports into the network. If undetected, these bogus reports would be forwarded to the data collection point (i.e. the sink). Such attacks by compromised sensors can cause not only false alarms but also the depletion of the finite amount of energy in a battery powe...
متن کامل