A Randomized Watermarking Technique for Detecting Malicious Data Injection Attacks in Heterogeneous Wireless Sensor Networks for Internet of Things Applications
<p>The network model.</p> "> Figure 2
<p>The radio energy model.</p> "> Figure 3
<p>The sequence diagram of the proposed scheme.</p> "> Figure 4
<p>Watermark embedding.</p> "> Figure 5
<p>A block diagram of the Randomized Watermarking Filtering Scheme (RWFS) showing the modules of the sensor node and cluster head. It also shows the flow of data between the modules.</p> "> Figure 6
<p>The filtering efficiency analysis between RWFS (the proposed scheme) and the Cui et al. scheme. The bar graphs show the percentage of filtered malicious packets for a different scenario where a different number of false packets was injected.</p> "> Figure 7
<p>The network overhead analysis between RWFS (the proposed scheme) and the Cui et al. scheme. The two graphs show the total number of packets sent during 10,000 rounds.</p> "> Figure 8
<p>The average remaining energy analysis between RWFS (the proposed scheme) and the Cui et al. scheme. The average energy of all nodes in the network is calculated at each round for a duration of 10,000 rounds.</p> "> Figure 9
<p>The network lifetime analysis between RWFS (the proposed scheme) and the Cui et al. scheme. The number of dead nodes is calculated at each round in a duration of 10,000 rounds.</p> "> Figure 10
<p>The delay analysis between RWFS (the proposed scheme) and the Cui et al. scheme. The average execution time for each round was measured for a total of 10,000 rounds.</p> ">
Abstract
:1. Introduction
- (1)
- Develop a novel energy-efficient scheme that aims to minimize both the packet size and number of communications between nodes.
- (2)
- Design a new and random way of embedding the watermark that will be based on pseudorandom number generator (PRNG) algorithm.
- (3)
- Investigate and evaluate the security and performance of the proposed watermark technique in filtering malicious data injection attacks.
2. Literature Review
3. System Models and Assumptions
3.1. Network Model
3.2. Clustering Model
3.3. Radio Energy Dissipation Model
3.4. Adversary Model
- (1)
- A passive adversary that can observe and obtain packets by eavesdropping on a network transmission.
- (2)
- An external adversary who can originate and inject false data from the outside. He can also replay old packets or modify the transmitted data.
- (3)
- An internal adversary that can physically compromise sensor nodes or cluster heads.
- (a)
- Eavesdropping Attack: this attack concerns the passive adversary who aims to obtain information by listening to the message transmission in the broadcasting wireless medium [41].
- (a)
- Injection Attack: In this attack, an adversary injects false data into the network and compromises the trust in the communicated information.
- (b)
- Replay Attack: the attacker captures some packets and resends them at a future time.
- (c)
- Modification Attack: the adversary modifies the data without knowing the content.
- (a)
- Node Compromise Attack: the attacker physically comprises a node or CH to obtain secret information and generate the secret parameters of the network.
4. Proposed Scheme
4.1. Phase 1: Set up and Key Management
4.2. Phase 2: Sensing and Reporting
Algorithm 1 Sense and report algorithm (mj,cj,aj,kcj) | ||
Input: pseudo random number generator parameters mj,cj and aj. Cluster key kcj Output: Ri = EiWi||Timestamp 1 Di = sensed data 2 Ei = Enc(Di, kcj) 3 Wi = HMAC(Ei ||Si ||Timestamp) || 4 for count=1 to numberOfPositions do | ||
5 | Xn+1 = (aj Xn + cj) mod mj | |
6 | pos[count] = Xn+1 | |
7 end 8 EiWi = Embed(Wi, Ei, pos[]) ▷Embed watermark Wi in Ei at positions pos[] 9 Ri = EiWi ||Timestamp 10 Send(Ri, CHj) |
4.2.1. Encryption Algorithm
4.2.2. Watermarking Algorithm
4.3. Phase 3: Verifying and Aggregation
- (1)
- The freshness of the timestamps attached to each report.
- (2)
- Verifying the watermark embedded within the measurement.
- (3)
- Having or more reports where T is the number of sensor nodes belonging to cluster j.
Algorithm 2 Verify and aggregate algorithm (Ri) | ||
Input: reports Ri from sensor nodes in the cluster Output: Rj = aggjWj||Timestamp 1 if Timestamp is not fresh then Reject packet; 2 for count=1 to numberOfPositions do | ||
3 | Xn+1 = (aj Xn + cj) mod mj | |
4 | pos[count] = Xn+1 | |
5 end 6 Ei, Wi = Extract(EiWi, pos[]) ▷Extract watermark Wi and Ei from EiWi at positions pos[] 7 W’ = HMAC(Ei ||Si ||Timestamp) 8 if W’ == Wi then | ||
9 | Accept packet | |
10 | aggj = aggregate(Ei) | |
11 else 12 Reject packet 13 end 14 Wj = HMAC(aggj || CHjID ||Timestamp) 15 aggjWj = Embed (Wj, aggj, pos[]) 16 Rj = aggjWj ||Timestamp 17 Send(Rj, AP) |
5. Security Analysis
- (a)
- Injection Attack: an adversary needs to generate a valid watermark to embed it into the injected data. This requires him to know the shared secret cluster key to generate it. Even if the shared secret is somehow disclosed, he will then need to know the random places to embed it. This requires knowledge of the secret PRNG parameters. This way, all injected false data are rejected either at the CH or the access point.
- (b)
- Replay Attack: an adversary resends old messages that he captures from the past. This will result in message drops, as all packets contain a timestamp to ensure that the packet is fresh.
- (c)
- Modification Attack: an attacker can modify the data sent and the packet will still look valid. That is due to the homomorphic encryption function’s properties. For example, a message can be altered to , where x is the modified value. The recipient can decrypt the message and obtain the modified value. In our scheme, the watermark is computed from the encrypted message and embedded inside the payload. So, any alteration done to the encrypted data will result in a failure of verification of the watermark.
6. Simulation and Results
6.1. Filtering Efficiency
6.2. Network Overhead
6.3. Average Energy Consumption
6.4. Network Lifetime
6.5. Delay
7. Conclusions
Author Contributions
Funding
Acknowledgments
Conflicts of Interest
References
- Ammar, M.; Russello, G.; Crispo, B. Internet of Things: A Survey on the Security of Iot Frameworks. J. Inf. Secur. Appl. 2018, 38, 8–27. [Google Scholar] [CrossRef]
- Gubbi, J.; Buyya, R.; Marusic, S.; Palaniswami, M. Internet of Things (IoT): A Vision, Architectural Elements, and Future Directions. Future Gener. Comput. Syst. 2013, 29, 1645–1660. [Google Scholar] [CrossRef]
- Manikandan, N.; Subha, S. Parallel Aes Algorithm for Performance Improvement in Data Analytics Security for Iot. Int. J. Netw. Virtual Organ. 2018, 18, 112–129. [Google Scholar] [CrossRef]
- Lazarescu, M.T. Wireless Sensor Networks for the Internet of Things: Barriers and Synergies. In Components and Services for Iot Platforms; Springer: Berlin/Heidelberg, Germany, 2017; pp. 155–186. [Google Scholar]
- Pawar, M.; Agarwal, J. A Literature Survey on Security Issues of WSN and Different Types of Attacks in Network. Indian J. Comput. Sci. Eng. 2017, 8, 80–83. [Google Scholar]
- Mahgoub, I.; Ilyas, M. Sensor Network Protocols; CRC press: Boca Raton, FL, USA, 2016. [Google Scholar]
- Kui, R.; Wenjing, L.; Yanchao, Z. Leds: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks. IEEE Trans. Mob. Comput. 2008, 7, 585–598. [Google Scholar]
- Khan, M.A.; Salah, K. Iot Security: Review, Blockchain Solutions, and Open Challenges. Future Gener. Comput. Syst. 2018, 82, 395–411. [Google Scholar] [CrossRef]
- Illiano, V.P.; Lupu, E.C. Detecting Malicious Data Injections in Wireless Sensor Networks: A Survey. ACM Comput. Surv. 2015, 48, 1–33. [Google Scholar] [CrossRef]
- Granjal, J.; Monteiro, E.; Silva, J.S. Security in the Integration of Low-Power Wireless Sensor Networks with the Internet: A Survey. Ad Hoc Netw. 2015, 24, 264–287. [Google Scholar] [CrossRef]
- Hameed, K.; Khan, M.S.; Ahmed, I.; Ahmad, Z.U.; Khan, A.; Haider, A.; Javaid, N. A Zero Watermarking Scheme for Data Integrity in Wireless Sensor Networks. In Proceedings of the 19th International Conference on Network-Based Information Systems (NBiS), Ostrava, Czech Republic, 7–9 September 2016; pp. 119–126. [Google Scholar]
- Bartariya, S.; Rastogi, A. Security in Wireless Sensor Networks: Attacks and Solutions. Environment 2016, 5, 214–220. [Google Scholar]
- Ahmadi, H.; Arji, G.; Shahmoradi, L.; Safdari, R.; Nilashi, M.; Alizadeh, M. The Application of Internet of Things in Healthcare: A Systematic Literature Review and Classification. Univers. Access Inf. Soc. 2018, 1–33. [Google Scholar] [CrossRef]
- Al-Garadi, M.A.; Mohamed, A.; Al-Ali, A.; Du, X.; Guizani, M. A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security. arXiv, 2018; arXiv:1807.11023. [Google Scholar]
- Asokan, N.; Brasser, F.; Ibrahim, A.; Sadeghi, A.-R.; Schunter, M.; Tsudik, G.; Wachsmann, C. Seda: Scalable Embedded Device Attestation. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, 12–16 October 2015; pp. 964–975. [Google Scholar]
- Ambrosin, M.; Conti, M.; Ibrahim, A.; Neven, G.; Sadeghi, A.-R.; Schunter, M. Sana: Secure and Scalable Aggregate Network Attestation. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, 24–28 October 2016; pp. 731–742. [Google Scholar]
- Sun, B.; Shan, X.; Wu, K.; Xiao, Y. Anomaly Detection Based Secure in-Network Aggregation for Wireless Sensor Networks. IEEE Syst. J. 2013, 7, 13–25. [Google Scholar] [CrossRef]
- Xinyu, Y.; Jie, L.; Wei, Y.; Moulema, P.M.; Xinwen, F.; Wei, Z. A Novel En-Route Filtering Scheme against False Data Injection Attacks in Cyber-Physical Networked Systems. IEEE Trans. Comput. 2015, 64, 4–18. [Google Scholar]
- Yu, Z.; Guan, Y. A Dynamic En-Route Scheme for Filtering False Data Injection in Wireless Sensor Networks; SenSys: Berkeley, CA, USA, 2005; pp. 294–295. [Google Scholar]
- Di Pietro, R.; Michiardi, P.; Molva, R. Confidentiality and Integrity for Data Aggregation in WSN Using Peer Monitoring. Secur. Commun. Netw. 2009, 2, 181–194. [Google Scholar] [CrossRef]
- Kumar, M.; Verma, S.; Lata, K. Secure Data Aggregation in Wireless Sensor Networks Using Homomorphic Encryption. Int. J. Electron. 2015, 102, 690–702. [Google Scholar] [CrossRef]
- Cui, J.; Shao, L.; Zhong, H.; Xu, Y.; Liu, L. Data Aggregation with End-to-End Confidentiality and Integrity for Large-Scale Wireless Sensor Networks. Peer-to-Peer Netw. Appl. 2018, 11, 1022–1037. [Google Scholar] [CrossRef]
- Hwang, T.; Gope, P. Ia-Ctr: Integrity-Aware Conventional Counter Mode for Secure and Efficient Communication in Wireless Sensor Networks. Wirel. Pers. Commun. 2017, 94, 467–479. [Google Scholar] [CrossRef]
- McGrew, D.A. Counter Mode Security: Analysis and Recommendations. Cisco Syst. Novemb. 2002, 2, 4. [Google Scholar]
- Lalem, F.; Muath, A.; Bounceur, A.; Euler, R.; Laouamer, L.; Nana, L.; Pascu, A.C. Data Authenticity and Integrity in Wireless Sensor Networks Based on a Watermarking Approach. In Proceedings of the 29th International Florida Artificial Intelligence Research Society, Key Largo, FL, USA, 16–18 May 2016. [Google Scholar]
- Fang, J.; Potkonjak, M. Real-Time Watermarking Techniques for Sensor Networks. In Proceedings of the Electronic Imaging 2003, Santa Clara, CA, USA, 21–24 January 2003; pp. 391–402. [Google Scholar]
- Tiwari, A.; Chakraborty, S.; Mishra, M.K. Secure Data Aggregation Using Irreversible Watermarking in WSNs. In Proceedings of the Confluence 2013: The Next Generation Information Technology Summit (4th International Conference), Noida, India, 26–27 September 2013; pp. 330–336. [Google Scholar]
- Boubiche, D.E.; Boubiche, S.; Bilami, A. A Cross-Layer Watermarking-Based Mechanism for Data Aggregation Integrity in Heterogeneous Wsns. IEEE Commun. Lett. 2015, 19, 823–826. [Google Scholar] [CrossRef]
- Sun, X.; Su, J.; Wang, B.; Liu, Q. Digital Watermarking Method for Data Integrity Protection in Wireless Sensor Networks. Int. J. Secur. Appl. 2013, 7, 407–416. [Google Scholar]
- Hameed, K.; Khan, A.; Ahmed, M.; Reddy, A.G.; Rathore, M.M. Towards a Formally Verified Zero Watermarking Scheme for Data Integrity in the Internet of Things Based-Wireless Sensor Networks. Future Gener. Comput. Syst. 2018, 82, 274–289. [Google Scholar] [CrossRef]
- Rouissi, N.; Gharsellaoui, H. Improved Hybrid Leach Based Approach for Preserving Secured Integrity in Wireless Sensor Networks. Procedia Comput. Sci. 2017, 112, 1429–1438. [Google Scholar] [CrossRef]
- Ren, Y.; Cheng, Y.; Wang, J.; Fang, L. Data Protection Based on Multifunction Digital Watermark in Wireless Sensor Network. In Proceedings of the International Carnahan Conference on Security Technology (ICCST), Taipei, Taiwan, 21–24 September 2015; pp. 37–41. [Google Scholar]
- Guan, T.; Chen, Y. A Node Clone Attack Detection Scheme Based on Digital Watermark in WSNs. In Proceedings of the IEEE International Conference on Computer Communication and the Internet (ICCCI), Wuhan, China, 13–15 October 2016; pp. 257–260. [Google Scholar]
- Shi, X.; Xiao, D. A Reversible Watermarking Authentication Scheme for Wireless Sensor Networks. Inf. Sci. 2013, 240, 173–183. [Google Scholar] [CrossRef]
- Ding, Q.; Wang, B.; Sun, X.; Wang, J.; Shen, J. A Reversible Watermarking Scheme Based on Difference Expansion for Wireless Sensor Networks. Int. J. Grid Distrib. Comput. 2015, 8, 143–154. [Google Scholar] [CrossRef]
- Li, X.; Zhong, Y.; Liao, F.; Li, R. An Improved Watermarking Scheme for Secure Data Aggregation in WSNs. Appl. Mech. Mater. 2014, 556–562, 6298–6301. [Google Scholar] [CrossRef]
- Saini, P.; Sharma, A.K. E-Deec-Enhanced Distributed Energy Efficient Clustering Scheme for Heterogeneous WSN. In Proceedings of the 2010 First International Conference On Parallel, Distributed and Grid Computing (PDGC 2010), Solan, India, 28–30 October 2010; pp. 205–210. [Google Scholar]
- Heinzelman, W.R.; Chandrakasan, A.; Balakrishnan, H. Energy-Efficient Communication Protocol for Wireless Microsensor Networks. In Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, Maui, HI, USA, 7 January 2000; Volume 2, p. 10. [Google Scholar]
- Pourpeighambar, S.B.; Aminian, M.; Sabaei, M. Energy Efficient Data Aggregation of Moving Object in Wireless Sensor Networks. In Proceedings of the Telecommunication Networks and Applications Conference (ATNAC), 2011 Australasian, Melbourne, VIC, Australia, 9–11 November 2011; pp. 1–8. [Google Scholar]
- Bushnag, A.; Abuzneid, A.; Mahmood, A. Source Anonymity in WSNs against Global Adversary Utilizing Low Transmission Rates with Delay Constraints. Sensors 2016, 16, 957. [Google Scholar] [CrossRef] [PubMed]
- Dai, H.-N.; Wang, Q.; Li, D.; Wong, R.C.-W. On Eavesdropping Attacks in Wireless Sensor Networks with Directional Antennas. Int. J. Distrib. Sens. Netw. 2013, 9, 760834. [Google Scholar] [CrossRef]
- Castelluccia, C.; Chan, A.C.-F.; Mykletun, E.; Tsudik, G. Efficient and Provably Secure Aggregation of Encrypted Data in Wireless Sensor Networks. ACM Trans. Sen. Netw. 2009, 5, 3. [Google Scholar] [CrossRef]
- Knuth, D.E. The Art of Computer Programming; Addison-Wesley: Boston, MA, USA, 1997; Volume 2. [Google Scholar]
Notation | Description |
---|---|
The cluster head node of the jth cluster in the network | |
The sensor node i | |
Number of sensor nodes per cluster | |
Number of sensor nodes in the whole network | |
Cluster identifier of cluster | |
The cluster key of the jth cluster in the network | |
The master key of the network | |
Watermark of the sensor node | |
Sensing data of the sensor node | |
Encrypted sensed data of the sensor node | |
The complete report of the sensor node |
Parameter | Value |
---|---|
Topographical Area | 100 m × 100 m |
Access point location | (50, 50) |
Number of nodes | 100 |
Fraction of advanced nodes (m) | m = 0.1 |
Initial energy of normal node ( | = 0.5 J |
50 nJ/bit | |
10 pJ/bit/m2 | |
0.0013 pJ/bit/m2 | |
5 nJ/bit | |
Packet header size | 150 bits |
© 2018 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Alromih, A.; Al-Rodhaan, M.; Tian, Y. A Randomized Watermarking Technique for Detecting Malicious Data Injection Attacks in Heterogeneous Wireless Sensor Networks for Internet of Things Applications. Sensors 2018, 18, 4346. https://doi.org/10.3390/s18124346
Alromih A, Al-Rodhaan M, Tian Y. A Randomized Watermarking Technique for Detecting Malicious Data Injection Attacks in Heterogeneous Wireless Sensor Networks for Internet of Things Applications. Sensors. 2018; 18(12):4346. https://doi.org/10.3390/s18124346
Chicago/Turabian StyleAlromih, Arwa, Mznah Al-Rodhaan, and Yuan Tian. 2018. "A Randomized Watermarking Technique for Detecting Malicious Data Injection Attacks in Heterogeneous Wireless Sensor Networks for Internet of Things Applications" Sensors 18, no. 12: 4346. https://doi.org/10.3390/s18124346
APA StyleAlromih, A., Al-Rodhaan, M., & Tian, Y. (2018). A Randomized Watermarking Technique for Detecting Malicious Data Injection Attacks in Heterogeneous Wireless Sensor Networks for Internet of Things Applications. Sensors, 18(12), 4346. https://doi.org/10.3390/s18124346