The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.01 - January (2012 vol.23)
pp: 32-43
Rongxing Lu , Dept. of Electr. & Comput. Eng., Univ. of Waterloo, Waterloo, ON, Canada
ABSTRACT
Injecting false data attack is a well known serious threat to wireless sensor network, for which an adversary reports bogus information to sink causing error decision at upper level and energy waste in en-route nodes. In this paper, we propose a novel bandwidth-efficient cooperative authentication (BECAN) scheme for filtering injected false data. Based on the random graph characteristics of sensor node deployment and the cooperative bit-compressed authentication technique, the proposed BECAN scheme can save energy by early detecting and filtering the majority of injected false data with minor extra overheads at the en-route nodes. In addition, only a very small fraction of injected false data needs to be checked by the sink, which thus largely reduces the burden of the sink. Both theoretical and simulation results are given to demonstrate the effectiveness of the proposed scheme in terms of high filtering probability and energy saving.
INDEX TERMS
wireless sensor networks, filtering theory, graph theory, sensor placement, telecommunication security, energy saving, BECAN, bandwidth efficient cooperative authentication, injected false data filtering, wireless sensor networks, false data attack, random graph, sensor node deployment, cooperative bit compressed authentication technique, filtering probability, Authentication, Wireless sensor networks, Routing, Nickel, Artificial neural networks, Communication system security, cooperative bit-compressed authentication., Wireless sensor network, injecting false data attack, random graph
CITATION
Rongxing Lu, "BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks", IEEE Transactions on Parallel & Distributed Systems, vol.23, no. 1, pp. 32-43, January 2012, doi:10.1109/TPDS.2011.95
REFERENCES
[1] R. Szewczky, A. Mainwaring, J. Anderson, and D. Culler, “An Analysis of a Large Scale Habit Monitoring Application,” Proc. Second ACM Int'l Conf. Embedded Networked Sensor Systems (Sensys '04), 2004.
[2] L. Eschenauer and V.D. Gligor, “A Key-Management Scheme for Distributed Sensor Networks,” Proc. Ninth ACM Conf. Computer and Comm. Security (CCS '02), 2002.
[3] R. Lu, X. Lin, C. Zhang, H. Zhu, P. Ho, and X. Shen, “AICN: An Efficient Algorithm to Identify Compromised Nodes in Wireless Sensor Network,” Proc. IEEE Int'l Conf. Comm. (ICC '08), May 2008.
[4] X. Lin, R. Lu, and X. Shen, “MDPA: Multidimensional Privacy-Preserving Aggregation Scheme for Wireless Sensor Networks,” Wireless Comm. and Mobile Computing, vol. 10, pp. 843-856, 2010.
[5] X. Lin, “CAT: Building Couples to Early Detect Node Compromise Attack in Wireless Sensor Networks,” Proc. IEEE GLOBECOM '09, Nov.-Dec. 2009.
[6] K. Ren, W. Lou, and Y. Zhang, “Multi-User Broadcast Authentication in Wireless Sensor Networks,” Proc. IEEE Sensor Ad Hoc Comm. Networks (SECON '07), June 2007.
[7] L. Zhou and C. Ravishankar, “A Fault Localized Scheme for False Report Filtering in Sensor Networks,” Proc. Int'l Conf. Pervasive Services, (ICPS '05), pp. 59-68, July 2005.
[8] Z. Zhu, Q. Tan, and P. Zhu, “An Effective Secure Routing for False Data Injection Attack in Wireless Sensor Network,” Proc. 10th Asia-Pacific Network Operations and Management Symp. (APNOMS '07), pp. 457-465, 2007.
[9] F. Ye, H. Luo, S. Lu, and L. Zhang, “Statistical En-Route Detection and Filtering of Injected False Data in Sensor Networks,” Proc. IEEE INFOCOM '04, Mar. 2004.
[10] S. Zhu, S. Setia, S. Jajodia, and P. Ning, “An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks,” Proc. IEEE Symp. Security and Privacy, 2004.
[11] H. Yang, F. Ye, Y. Yuan, S. Lu, and W. Arbaugh, “Toward Resilient Security in Wireless Sensor Networks,” Proc. Sixth ACM Int'l Symp. Mobile Ad Hoc Networking and Computing (MobiHoc '05), pp. 34-45, 2005.
[12] K. Ren, W. Lou, and Y. Zhang, “LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks,” Proc. IEEE INFOCOM '06, Apr. 2006.
[13] Y. Zhang, W. Liu, W. Lou, and Y. Fang, “Location-Based Compromise-Tolerant Security Mechanisms for Wireless Sensor Networks,” IEEE J. Selected Areas in Comm., vol. 24, no. 2, pp. 247-260, Feb. 2006.
[14] C.-M. Yu, C.-S. Lu, and S.-Y. Kuo, “A Dos-Resilient En-Route Filtering Scheme for Sensor Networks,” Proc. Tenth ACM Int'l Symp. Mobile Ad Hoc Networking and Computing (MobiHoc '09), pp. 343-344, 2009.
[15] J. Chen, Q. Yu, Y. Zhang, H.-H. Chen, and Y. Sun, “Feedback Based Clock Synchronization in Wireless Sensor Networks: A Control Theoretic Approach,” IEEE Trans. Vehicular Technology, vol. 59, no. 6, pp. 2963-2973, June 2010.
[16] S. He, J. Chen, Y. Sun, D.K.Y. Yau, and N.K. Yip, “On Optimal Information Capture by Energy-Constrained Mobile Sensors,” IEEE Trans. Vehicular Technology, vol. 59, no. 5, pp. 2472-2484, June 2010.
[17] K. Akkaya and M. Younis, “A Survey on Routing Protocols for Wireless Sensor Networks,” Ad Hoc Networks, vol. 3, no. 3, pp. 325-349, May 2005.
[18] V.C. Giruka, M. Singhal, J. Royalty, and S. Varanasi, “Security in Wireless Sensor Networks,” Wireless Comm. and Mobile Computing, vol. 8, no. 1, pp. 1-24, Jan. 2008.
[19] A. Liu and P. Ning, “TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks,” Proc. Seventh Int'l Conf. Information Processing in Sensor Networks (IPSN '08), pp. 245-256, Apr. 2008.
[20] J. Dong, Q. Chen, and Z. Niu, “Random Graph Theory Based Connectivity Analysis in Wireless Sensor Networks with Rayleigh Fading Channels,” Proc. Asia-Pacific Conf. Comm. (APCC '07), pp. 123-126, Oct. 2007.
[21] MICAz: Wireless Measurement System, http://www.xbow.com/Products/Product_pdf_files/ Wireless_pdfMICAz_Data sheet.pdf, 2010.
[22] Imote2: High-Performance Wireless Sensor Network Node, http://www.xbow.com/Products/Product_pdf_files/ Wireless_ pdfImote2_Dat asheet.pdf, 2010.
[23] C. Boyd, W. Mao, and K.G. Paterson, “Key Agreement Using Statically Keyed Authenticators,” Proc. Second Int'l Conf. Applied Cryptography and Network Security ¨C (ACNS '04), pp. 248-262, 2004.
[24] J. Black and P. Rogaway, “Cbc Macs for Arbitrary-Length Messages: the Three-Key Constructions,” J. Cryptology, vol. 18, no. 2, pp. 111-131, 2005.
[25] W. Mao, Modern Cryptography: Theory and Practice. Prentice Hall PTR, 2003.
[26] X. Li, N. Santoro, and I. Stojmenovic, “Localized Distance-Sensitive Service Discovery in Wireless Sensor and Actor Networks,” IEEE Trans. Computers, vol. 58, no. 9, pp. 1275-1288, Sept. 2009.
[27] X. Li, A. Nayak, D. Simplot-Ryl, and I. Stojmenovic, “Sensor Placement in Sensor and Actuator Networks,” Wireless Sensor and Actuator Networks: Algorithms and Protocols for Scalable Coordination and Data Communication, Wiley, 2010.
[28] X. Du, Y. Xiao, M. Guizani, and H.-H. Chen, “An Effective Key Management Scheme for Heterogeneous Sensor Networks,” Ad Hoc Networks, vol. 5, pp. 24-34, Jan. 2007.
[29] R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor, and B. Pinkas, “Multicast Security: A Taxonomy and Some Efficient Constructions,” Proc. IEEE INFOCOM '99, pp. 708-716, Mar. 1999.
[30] Z. Benenson, C. Freiling, E. Hammerschmidt, S. Lucks, and L. Pimenidis, “Authenticated Query Flooding in Sensor Networks,” Security and Privacy in Dynamic Environments, Springer, pp. 38-49, July 2006.
[31] X. Lin, R. Lu, P. Ho, X. Shen, and Z. Cao, “TUA: A Novel Compromise-Resilient Authentication Architecture for Wireless Mesh Networks,” IEEE Trans. Wireless Comm., vol. 7, no. 4, pp. 1389-1399, Apr. 2008.
[32] C. Zhang, R. Lu, X. Lin, P. Ho, and X. Shen, “An Efficient Identity-Based Batch Verification Scheme for Vehicular Sensor Networks,” Proc. IEEE INFOCOM '08, Apr. 2008.
5 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool