期刊文献+

A neighbor information based false data filtering scheme in wireless sensor networks 被引量:1

A neighbor information based false data filtering scheme in wireless sensor networks
下载PDF
导出
摘要 In sensor networks,the adversaries can inject false data reports from compromised nodes.Previous approaches to filter false reports,e.g.,SEF,only verify the correctness of the message authentication code (MACs) carried in each data report on intermediate nodes,thus cannot filter out fake reports that are forged in a collaborative manner by a group of compromised nodes,even if these compromised nodes distribute in different geographical areas.Furthermore,if the adversary obtains keys from enough (e.g.,more than t in SEF) distinct key partitions,it then can successfully forge a data report without being detected en-route.A neighbor information based false report filtering scheme (NFFS) in wireless sensor networks was presented.In NFFS,each node distributes its neighbor information to some other nodes after deployment.When a report is generated for an observed event,it must carry the IDs and the MACs from t detecting nodes.Each forwarding node checks not only the correctness of the MACs carried in the report,but also the legitimacy of the relative position of these detecting nodes.Analysis and simulation results demonstrate that NFFS can resist collaborative false data injection attacks efficiently,and thus can tolerate much more compromised nodes than existing schemes. In sensor networks, the adversaries can inject false data reports from compromised nodes. Previous approaches to filter false reports, e.g., SEF, only verify the correctness of the message authentication code (MACs) carried in each data report on intermediate nodes, thus cannot filter out fake reports that are forged in a collaborative manner by a group of compromised nodes, even if these compromised nodes distribute in different geographical areas. Furthermore, if the adversary obtains keys from enough (e.g., more than t in SEF) distinct key partitions, it then can successfully forge a data report without being detected en-route. A neighbor information based false report filtering scheme (NFFS) in wireless sensor networks was presented. In NFFS, each node distributes its neighbor information to some other nodes after deployment. When a report is generated for an observed event, it must carry the IDs and the MACs from t detecting nodes. Each forwarding node checks not only the correctness of the MACs carried in the report, but also the legitimacy of the relative position of these detecting nodes. Analysis and simulation results demonstrate that NFFS can resist collaborative false data injection attacks efficiently, and thus can tolerate much more compromised nodes than existing schemes.
出处 《Journal of Central South University》 SCIE EI CAS 2012年第11期3147-3153,共7页 中南大学学报(英文版)
基金 Projects(61173169,61103203,70921001)supported by the National Natural Science Foundation of China Project(NCET-10-0798)supported by Program for New Century Excellent Talents in University of China
关键词 wireless sensor network false report filtering neighbor information collaborative attack compromise tolerance 无线传感器网络 数据过滤 信息 邻居 基础 数据报告 消息认证 地理区域
  • 相关文献

参考文献13

  • 1任丰原,黄海宁,林闯.无线传感器网络[J].软件学报,2003,14(7):1282-1291. 被引量:1709
  • 2裴智强,徐昌庆,藤劲.Node scattering manipulation based on trajectory model in wireless sensor network[J].Journal of Central South University,2010,17(5):991-999. 被引量:2
  • 3苏忠,林闯,封富君,任丰原.无线传感器网络密钥管理的方案和协议[J].软件学报,2007,18(5):1218-1231. 被引量:111
  • 4YE Fan, LUO Hai-yun, LU Song-wu, ZHANG Li-xia. Statistical en-route filtering of injected false data in sensor networks [C]// Proceedings of 23th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM' 04). Hong Kong, China, 2004: 2446-2457. 被引量:1
  • 5ZHU Sen-cun, SETIA S, JAJODIA S. An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks [C]// Proceeding IEEE symposium on Security and privacy (S&P' 04). California, USA, 2004: 259-271. 被引量:1
  • 6YU ZHEN, GUAN Yong. A dynamic en-route scheme for filtering false data injection in wireless sensor networks [C]// Proceedings of 25th Annual Joint Conference of the IEEE Computer and Communications Societies (1NFOCOM' 06). Barcelona, Spain, 2006: 1-12. 被引量:1
  • 7LI Yu, LI Jiang-zhong. Grouping-based resilient statistical en-route filtering for sensor networks [C]// Proceedings of 28th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2009). Rio de Janeiro, Brazil, 2009: 1782-1790. 被引量:1
  • 8YANG Hao, LU Song-wu. Commutative cipher based en-route filtering in wireless sensor networks [C]// Vehicular Technology Conference (VTC' 04). Los Angeles, USA, 2004: 1223-1227. 被引量:1
  • 9WANG Hao-dong, LI Qun. PDF:A public-key based false data filtering scheme in sensor networks [C]// Proceedings of the International Conference on Wireless Algorithms, Systems and Applications (WASA' 07). Chicago, USA, 2007: 129-138. 被引量:1
  • 10AYDAY E, DELGOSHA F, FEKRI F. Location-aware security services for wireless sensor networks using network coding [C]// Proceedings of the IEEE Conference on Computing and Communicating (INFOCOM' 07). Alaska, USA, 2007: 1226-1234. 被引量:1

二级参考文献49

  • 1马朝利,A.INOUE,张涛.Ultrahigh performance of Ti-based glassy alloy tube sensor for Coriolis mass flowmeter[J].中国有色金属学会会刊:英文版,2006,16(A02):202-205. 被引量:2
  • 2HOWARD A, MATARIC M J, SUKHATME G S. An incremental self-deployment algorithm for mobile sensor network [J].Autonomous Robots: Special Issue on Intelligent Embedded Systems, 2002, 13(2): 113- 126. 被引量:1
  • 3LI L, HALPERN J Y, BAHL P, WANG Y M, WATTENHOFER R. Analysis of a cone-based distributed topology control algorithm for wireless multi-hop networks [C]// Proceedings of ACM Symposium on Principles of Distributed Computing. Newport, Rhode Island, 2001: 264-273. 被引量:1
  • 4kl N, HOY J C, SHA L. Design and analysis of an MST-based lopology control algorithm [J]. IEEE Transactions on Wireless Communications, 2005, 4(3): 1195 -1206. 被引量:1
  • 5KUMAR S, LAI T H, BALOGH J. On k-coverage in a mostly sleeping sensor network [J]. Wireless Networks, 2008, 14(3): 144- 158. 被引量:1
  • 6ZOU Y, CHAKRABARTY K. A distributed coverage- and connectivity-centric technique for selecting active nodes in wireless sensor networks [J]. IEEE Transactions on Computers, 2005, 54(8): 978-991. 被引量:1
  • 7WANG X R, XING G L, ZHANG Y F, LU C Y, PLESS R, GILL C. Integrated coverage and connectivity configuration in wireless sensor networks [C]// Proceedings of the 1st International Conference on Embedded Networked Sensor Systems. Los Angeles, 2003: 28-39. 被引量:1
  • 8WANG G L, CAO G H, la PORTA T. Movement-assisted sensor deployment [J]. IEEE Transactions on Mobile Computing, 2006, 5(6): 2469 -2479. 被引量:1
  • 9WU Jie, YANG Shu-hui. Smart: A scan-based movement-assisted deployment method in wireless sensor networks [C]// The 24th Annual Joint Conference of IEEE Computer and Communications Societies. Miami, 2005:2313- 2324. 被引量:1
  • 10ZOU Y, CHAKRABARTY K. Sensor deployment and target localization based on virtual forces [C]// The 22nd Annual Joint Conference of the IEEE Computer and Communications Societies. San Francisco, 2003:1293 1303. 被引量:1

共引文献1806

同被引文献1

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部