A Report Generation Method for Defending False Negative Attacks in Ubiquitous Sensor Networks

نویسندگان

  • Hae Young Lee
  • Tae Ho Cho
چکیده

Ye et al. proposed the statistical en-route filtering scheme to address false data injection attacks in which an adversary uses compromised nodes to inject forged reports into the network with the goal of deceiving the base station or depleting the resources of the relaying nodes. This scheme can detect such forged reports but is vulnerable to false negative attacks during the report generation process. Thus, a legitimate event may not be reported properly. In this paper, we propose a report generation method to achieve resilience in terms of false negative attacks against the report generation process of the statistical en-route filtering scheme in ubiquitous sensor networks. In the proposed method, one of the detecting nodes randomly selects several nodes to generate sensing reports and key indices to generate message authentication codes (MACs). Each of the nodes selected to produce reports generates a sensing report which contains only the matched MACs, collected from different nodes, using the keys indicated by the key indices. We analyze the security level of the proposed method under various false negative attacks against the report generation process at the end of this paper.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Evaluation of an Intrusion Detection System for Routing Attacks in Wireless Self-organised Networks

Wireless Sensor Networks (WSNs) arebecoming increasingly popular, and very useful in militaryapplications and environmental monitoring. However,security is a major challenge for WSNs because they areusually setup in unprotected environments. Our goal in thisstudy is to simulate an Intrusion Detection System (IDS)that monitors the WSN and report intrusions accurately andeffectively. We have thus...

متن کامل

A Lightweight Intrusion Detection System Based on Specifications to Improve Security in Wireless Sensor Networks

Due to the prevalence of Wireless Sensor Networks (WSNs) in the many mission-critical applications such as military areas, security has been considered as one of the essential parameters in Quality of Service (QoS), and Intrusion Detection System (IDS) is considered as a fundamental requirement for security in these networks. This paper presents a lightweight Intrusion Detection System to prote...

متن کامل

Intrusion Detection Scheme against Sinkhole Attacks in Directed Diffusion Based Sensor Networks

Wireless Sensor Networks (WSNs) detect and report interesting events when they occur in the target region. These networks are vulnerable to security breach due to wireless communication and lack of infrastructure. In sinkhole attacks, an attacker attracts network traffic by forging or replaying routing messages through compromised nodes. Thus attracted traffic is used for selective forwarding, ...

متن کامل

Defending collaborative false data injection attacks in wireless sensor networks

False data filtering is an important issue in wireless sensor networks. In this paper, we consider a new type of false data injection attacks called collaborative false data injection, and propose two schemes to defend such attacks. In collaborative false data injection attacks, multiple compromised nodes collaboratively forge a fake report and inject the report into the network. This type of a...

متن کامل

A Novel Ensemble Approach for Anomaly Detection in Wireless Sensor Networks Using Time-overlapped Sliding Windows

One of the most important issues concerning the sensor data in the Wireless Sensor Networks (WSNs) is the unexpected data which are acquired from the sensors. Today, there are numerous approaches for detecting anomalies in the WSNs, most of which are based on machine learning methods. In this research, we present a heuristic method based on the concept of “ensemble of classifiers” of data minin...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007