[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

Statistical en-route filtering of injected false data in sensor networks

Published: 01 September 2006 Publication History

Abstract

In a large-scale sensor network individual sensors are subject to security compromises. A compromised node can be used to inject bogus sensing reports. If undetected, these bogus reports would be forwarded to the data collection point (i.e., the sink). Such attacks by compromised nodes can result in not only false alarms but also the depletion of the finite amount of energy in a battery powered network. In this paper, we present a statistical en-route filtering (SEF) mechanism to detect and drop false reports during the forwarding process. Assuming that the same event can be detected by multiple sensors, in SEF each of the detecting sensors generates a keyed message authentication code (MAC) and multiple MACs are attached to the event report. As the report is forwarded, each node along the way verifies the correctness of the MAC's probabilistically and drops those with invalid MACs. SEF exploits the network scale to filter out false reports through collective decision-making by multiple detecting nodes and collective false detection by multiple forwarding nodes. We have evaluated SEF's feasibility and performance through analysis, simulation, and implementation. Our results show that SEF can be implemented efficiently in sensor nodes as small as Mica2. It can drop up to 70% of bogus reports injected by a compromised node within five hops, and reduce energy consumption by 65% or more in many cases.

Cited By

View all
  • (2024)Cooperative Observer-Based Fuzzy Tracking Control for Nonlinear MASs Under DoS AttacksIEEE Transactions on Fuzzy Systems10.1109/TFUZZ.2023.330637232:3(767-777)Online publication date: 1-Mar-2024
  • (2023)On the Evolutionary of Bloom Filter False Positives - An Information Theoretical Approach to Optimizing Bloom Filter ParametersIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2022.320004535:7(7316-7327)Online publication date: 1-Jul-2023
  • (2023)Popularity Cuckoo Filter: Always Keeping Popular Items in MindAlgorithms and Architectures for Parallel Processing10.1007/978-981-97-0808-6_25(428-445)Online publication date: 20-Oct-2023
  • Show More Cited By
  1. Statistical en-route filtering of injected false data in sensor networks

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image IEEE Journal on Selected Areas in Communications
    IEEE Journal on Selected Areas in Communications  Volume 23, Issue 4
    September 2006
    184 pages

    Publisher

    IEEE Press

    Publication History

    Published: 01 September 2006

    Author Tags

    1. Compromised nodes
    2. en-route filtering
    3. false data injection

    Qualifiers

    • Research-article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 12 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Cooperative Observer-Based Fuzzy Tracking Control for Nonlinear MASs Under DoS AttacksIEEE Transactions on Fuzzy Systems10.1109/TFUZZ.2023.330637232:3(767-777)Online publication date: 1-Mar-2024
    • (2023)On the Evolutionary of Bloom Filter False Positives - An Information Theoretical Approach to Optimizing Bloom Filter ParametersIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2022.320004535:7(7316-7327)Online publication date: 1-Jul-2023
    • (2023)Popularity Cuckoo Filter: Always Keeping Popular Items in MindAlgorithms and Architectures for Parallel Processing10.1007/978-981-97-0808-6_25(428-445)Online publication date: 20-Oct-2023
    • (2022)Improved Authentication in Secured Multicast Wireless Sensor Network (MWSN) Using Opposition Frog Leaping Algorithm to Resist Man-in-Middle AttackWireless Personal Communications: An International Journal10.1007/s11277-021-09209-1123:2(1715-1731)Online publication date: 1-Mar-2022
    • (2021)En-Route Message Authentication Scheme for Filtering False Data in WSNsSecurity and Communication Networks10.1155/2021/40685072021Online publication date: 1-Jan-2021
    • (2020)Rank-Based Report Filtering Scheme (RRFS) for Verifying Phoney Reports in Wireless Sensor NetworksWireless Communications & Mobile Computing10.1155/2020/27859602020Online publication date: 1-Jan-2020
    • (2020)Security of the Internet of Things: Vulnerabilities, Attacks, and CountermeasuresIEEE Communications Surveys & Tutorials10.1109/COMST.2019.295336422:1(616-644)Online publication date: 9-Mar-2020
    • (2019)Set Reconciliation with Cuckoo FiltersProceedings of the 28th ACM International Conference on Information and Knowledge Management10.1145/3357384.3358065(2465-2468)Online publication date: 3-Nov-2019
    • (2019)Reducing Effects of Bad Data Using Variance Based Joint Sparsity RecoveryJournal of Scientific Computing10.1007/s10915-018-0754-278:1(94-120)Online publication date: 1-Jan-2019
    • (2018)Novel metric for performance evaluation of routing in MANETsProceedings of the 3rd International Conference on Smart City Applications10.1145/3286606.3286855(1-4)Online publication date: 10-Oct-2018
    • Show More Cited By

    View Options

    View options

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media