Bogus Data Filtering in Sensor Networks

نویسندگان

  • Yong Ho Kim
  • Jong Hwan Park
  • Dong Hoon Lee
  • Jongin Lim
چکیده

Recently, Zhang et al. proposed a location-based thresholdendorsement scheme (LTE) to thwart bogus data injection attacks. This scheme exhibits much greater filtering power than earlier symmetric schemes and results in enhanced energy savings. In this paper, we show that LTE has a significant vulnerability. We also propose an improved scheme that mitigates this weakness and thereby achieves the original claims of Zhang et al. without lessening LTE’s remarkable filtering power.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Refining Bogus Data in Wireless Sensor Network Using Non Repudiation and Enrouting Filter Mechanism

Wireless sensor network is usually composed of a large number of sensor nodes which are interconnected through wireless links to perform distributed sensing tasks. When a sensor node generates report after being triggered by a special event, it will send the report to a data collection unit (also known as sink) through an established routing path. Wireless sensor networks are usually deployed a...

متن کامل

Message Authentication in Sensor Networks Using En-route Filtering

-------------------------------------------------------------------ABSTRACT---------------------------------------------------In a large-scale sensor network individual sensors are subject to security compromises. A compromised node can be used to inject bogus sensing reports. If undetected, these bogus reports would be forwarded to the data collection point (i.e. the sink).such attacks by comp...

متن کامل

Filtering Injected False Data in Wireless Sensor Network Using Bandwidth Efficient Cooperative Authentication Scheme

www.ijeist.in Abstract— Wireless sensor networks are usually deployed at unattended or hostile environments. Therefore, they are very vulnerable to various security attacks, such as selective forwarding, wormholes, and Sybil attacks. In addition, wireless sensor networks may also suffer from Injecting false data attack. For an injecting false data attack, an adversary first compromises several ...

متن کامل

Achieving robust message authentication in sensor networks: a public-key based approach

Given the extremely limited hardware resources on sensor nodes and the inclement deploying environment, the adversary Denial-of-Service (DoS) attack becomes a serious security threat toward wireless sensor networks. Without adequate defense mechanism, the adversary can simply inundate the network by flooding the bogus data packets, and paralyze the partial or whole sensor network by depleting n...

متن کامل

Statistical En-route Detection and Filtering of Injected False Data in Sensor Networks

In a large-scale sensor network individual sensors are subject to security compromises. A compromised node can inject bogus sensing reports into the network. If undetected, these bogus reports would be forwarded to the data collection point (i.e. the sink). Such attacks by compromised sensors can cause not only false alarms but also the depletion of the finite amount of energy in a battery powe...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007