The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.05 - May (2012 vol.23)
pp: 881-889
Jianzhong Li , Harbin Institute of Technology, Heilongjiang
Lei Yu , Clemson University, Clemson
Hong Gao , Harbin Institute of Technology, Heilongjiang
Shuguang Xiong , IBM China Research Lab, Beijing
ABSTRACT
In wireless sensor networks, the adversary may inject false reports to exhaust network energy or trigger false alarms with compromised sensor nodes. In response to the problems of existing schemes on the security resiliency, applicability and filtering effectiveness, this paper proposes a scheme, referred to as Grouping-enhanced Resilient Probabilistic En-route Filtering (GRPEF). In GRPEF, an efficient distributed algorithm is proposed to group nodes without incurring extra groups, and a multiaxis division based approach for deriving location-aware keys is used to overcome the threshold problem and remove the dependence on the sink immobility and routing protocols. Compared to the existing schemes, GRPEF significantly improves the effectiveness of the en-route filtering and can be applied to the sensor networks with mobile sinks while reserving the resiliency.
INDEX TERMS
Wireless sensor networks, network security, node compromise, false data injection, en-route filtering, mobile sink.
CITATION
Jianzhong Li, Lei Yu, Hong Gao, Shuguang Xiong, "Grouping-Enhanced Resilient Probabilistic En-Route Filtering of Injected False Data in WSNs", IEEE Transactions on Parallel & Distributed Systems, vol.23, no. 5, pp. 881-889, May 2012, doi:10.1109/TPDS.2011.217
REFERENCES
[1] F. Ye, H. Luo, S. Lu, L. Zhang, and S. Member, "Statitical En-Route Filtering of Injected False Data in Sensor Networks," Proc. IEEE INFOCOM, pp. 839-850, 2004.
[2] S. Zhu, S. Setia, and S. Jajodia, "An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks," Proc. IEEE Symp. Security and Privacy, pp. 259-271, 2004.
[3] H. Yang, F. Ye, Y. Yuan, S. Lu, and W.A. Arbaugh, "Toward Resilient Security in Wireless Sensor Networks," Proc. Sixth ACM Int'l Symp. Mobile Ad Hoc Networking and Computing, pp. 34-45, 2005.
[4] Z. Yu and Y. Guan, "A Dynamic En-Route Scheme for Filtering False Data Injection in Wireless Sensor Networks," Proc. IEEE INFOCOM, Apr. 2006.
[5] K. Ren, W. Lou, and Y. Zhang, "LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks," Proc. IEEE INFOCOM, Apr. 2006.
[6] F. Ye, H. Luo, J. Cheng, S. Lu, and L. Zhang, "A Two-Tier Data Dissemination Model for Large-Scale Wireless Sensor Networks," Proc. ACM Mobicom, pp. 148-159, 2002.
[7] J. Albowicz, A. Chen, and L. Zhang, "Recursive Position Estimation in Sensor Networks," Proc. Ninth Int'l Conf. Network Protocols (ICNP), pp. 35-41, 2001.
[8] L. Lazos and R. Poovendran, "Serloc: Secure Range-Independent Localization for Wireless Sensor Networks," Proc. Third ACM Workshop Wireless Security (WiSe '04), pp. 21-30, 2004.
[9] S. Capkun and J. pierre Hubaux, "Secure Positioning of Wireless Devices with Application to Sensor Networks," Proc. IEEE INFOCOM, 2005.
[10] W. Wang, V. Srinivasan, B. Wang, and K.-C. Chua, "Coverage for Target Localization in Wireless Sensor Networks," IPSN '06: Proc. Fifth Int'l Conf. Information Processing in Sensor Networks, pp. 118-125, 2006.
[11] X. Wang, G. Xing, Y. Zhang, C. Lu, R. Pless, and C. Gill, "Integrated Coverage and Connectivity Configuration in Wireless Sensor Networks," SenSys '03: Proc. First Int'l Conf. Embedded Networked Sensor Systems, pp. 28-39, 2003.
[12] A. Cerpa and D. Estrin, "Ascent: Adaptive Self-Configuring Sensor Networks Topologies," IEEE Trans. Mobile Computing, vol. 3, no. 3, pp. 272-285, July/Aug. 2004.
[13] S. Zhu, S. Setia, and S. Jajodia, "LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks," Proc. ACM Conf. Computer and Comm. Security, pp. 62-72, 2003.
[14] D. Liu and P. Ning, "Establishing Pairwise Keys in Distributed Sensor Networks," CCS '03: Proc. 10th ACM Conf. Computer and Comm. Security, pp. 52-61, 2003.
6 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool