[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1516241.1516342acmconferencesArticle/Chapter ViewAbstractPublication PagesicuimcConference Proceedingsconference-collections
research-article

Energy efficient filtering method in sensor networks

Published: 15 February 2009 Publication History

Abstract

Wireless sensor networks (WSN) sense and report interesting events in the sensor field to users. Usually, the sensor field for WSN is hostile and lacks infrastructure, so WSNs are exposed to security threats. In false report injection attacks, attackers inject false reports into the network through compromised nodes. Among many countermeasures to the attacks, the statistical en-route filtering scheme (SEF) detects and drops false reports by collaborative generation and verification of event reports by sensor nodes. In SEF, each node verifies received reports based on a pre-determined probability without consideration of sending nodes, consuming unnecessary energy for report verification. In this paper, we propose an energy-efficient filtering method for sensor networks. In the method, each node controls its verification probabilities for event reports, which depend on sending nodes. The number of recent valid reports and the false traffic ratio of each neighbor node are used to determine the verification probability for each node. We confirmed that our method uses energy efficiently without weakening en-route filtering capability.

References

[1]
Xu, N. 2002. A Survey of Sensor Network Applications. Tech. Rep., University of Southern California.
[2]
Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., and Cayirci, E. 2002. A Survey on Sensor Networks. IEEE Communications Magazine, 40(8), 102--116.
[3]
Al-Karaki, J. N., Kamal, A. E. 2004. Routing techniques in wireless sensor networks: a survey. IEEE Wireless Communication Magazine, 11(6), 6--28.
[4]
Djenouri, D., Khelladi, L., Badache, N. 2005. A Survey of Security Issues in Mobile Ad-Hoc and Sensor Networks. IEEE Communications Surveys & Tutorials, 7(4), 2--28.
[5]
Karlof, C., Wagner, D. 2003. Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures. Elsevier's Ad Hoc Networks Journal, Special Issue on Sensor Network Protocols and Applications, 1(2-3), 293--315.
[6]
Ye, F., Luo, H., Lu, S., Zhang, L. 2005. Statistical En-route Filtering of Injected False Data in Sensor Networks. IEEE Journals on Selected Areas in Communications, 23(4), 839--850.
[7]
Yang, H., Lu, S. 2004. Commutative Cipher Based En-route Filtering in Wireless Sensor Networks. Proc. of VTC, 1223--1227, IEEE.
[8]
Zhu, S., Setia, S., Jajodia, S., Ning, P. 2004. An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks. Proc. S&P, 259--271.
[9]
Yu, Z., Guan, Y. 2005. A Dynamic En-route Scheme for Filtering False Data Injection in Wireless Sensor Networks. Proc. of SenSys, 294--295, ACM.
[10]
Lee, H. Y., Cho, T. H. 2006. Key Inheritance-Based False Data Filtering Scheme in Wireless Sensor Networks. Lecture Notes in Computer Science, LNCS 4317, 116--127, Springer Verlag.
[11]
Yen, John, Langari, Reza. (1999). Fuzzy Logic. Prentice Hall.
[12]
Hill, J., Szewczyk, R., Woo, A., Hollar, S., Culler, D., Pister, K. 2000. System Architecture Directions for Networked Sensors. Proc. of ACM ASPLOS IX, 93--104.
[13]
Xbow sensor networks, http://www.xbow.com
[14]
Intanagonwiwat, C., Govindan, R., Estrin, D. (2000). Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks. Proc. of MOBICOM, 56--67, ACM.
[15]
FFLL, http://ffll.sourceforge.net

Cited By

View all
  • (2012)Key Index-Based Routing for Filtering False Event Reports in Wireless Sensor NetworksIEICE Transactions on Communications10.1587/transcom.E95.B.2807E95.B:9(2807-2814)Online publication date: 2012
  1. Energy efficient filtering method in sensor networks

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    ICUIMC '09: Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication
    February 2009
    704 pages
    ISBN:9781605584058
    DOI:10.1145/1516241
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 15 February 2009

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. SEF
    2. false report injection
    3. security attacks
    4. wireless sensor networks

    Qualifiers

    • Research-article

    Funding Sources

    Conference

    ICUIMC '09
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 251 of 941 submissions, 27%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 12 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2012)Key Index-Based Routing for Filtering False Event Reports in Wireless Sensor NetworksIEICE Transactions on Communications10.1587/transcom.E95.B.2807E95.B:9(2807-2814)Online publication date: 2012

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media