Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article

A dynamic en-route filtering scheme for data reporting in wireless sensor networks

Published: 01 February 2010 Publication History

Abstract

In wireless sensor networks, adversaries can inject false data reports via compromised nodes and launch DoS attacks against legitimate reports. Recently, a number of filtering schemes against false reports have been proposed. However, they either lack strong filtering capacity or cannot support highly dynamic sensor networks very well. Moreover, few of them can deal with DoS attacks simultaneously. In this paper, we propose a dynamic en-route filtering scheme that addresses both false report injection and DoS attacks in wireless sensor networks. In our scheme, each node has a hash chain of authentication keys used to endorse reports; meanwhile, a legitimate report should be authenticated by a certain number of nodes. First, each node disseminates its key to forwarding nodes. Then, after sending reports, the sending nodes disclose their keys, allowing the forwarding nodes to verify their reports. We design the Hill Climbing key dissemination approach that ensures the nodes closer to data sources have stronger filtering capacity. Moreover, we exploit the broadcast property of wireless communication to defeat DoS attacks and adopt multipath routing to deal with the topology changes of sensor networks. Simulation results show that compared to existing solutions, our scheme can drop false reports earlier with a lower memory requirement, especially in highly dynamic sensor networks.

References

[1]
D. Braginsky and D. Estrin, "Rumor routing algorithm for sensor networks," in Proc. WSNA, 2002, pp. 22-31.
[2]
N. Bulusu, J. Heidemann, and D. Estrin, "GPS-less low cost outdoor localization for very small devices," IEEE Personal Commun. Mag., vol. 7, no. 5, pp. 28-34, Oct. 2000.
[3]
S. Capkun and J. Hubaux, "Secure positioning of wireless devices with application to sensor networks," in Proc. IEEE INFOCOM, 2005, vol. 3, pp. 1917-1928.
[4]
L. Eschenauer and V. Gligor, "A key-management scheme for distributed sensor networks," in Proc. ACM CCS, 2002, pp. 41-47.
[5]
T. He, C. Huang, B. Blum, J. Stankovic, and T. Abdelzaher, "Range-free localization schemes in large scale sensor network," in Proc. ACM MobiCom, 2003, pp. 81-95.
[6]
C. Karlof and D.Wagner, "Secure routing in wireless sensor networks: Attacks and countermeasures," in Proc. 1st IEEE Int.Workshop Sensor Netw. Protocols Appl., 2003, pp. 113-127.
[7]
B. Karp and H. T. Kung, "GPSR: Greedy perimeter stateless routing for wireless networks," in Proc. ACM MobiCom, 2000, pp. 243-254.
[8]
L. Lazos and R. Poovendran, "SeRLoc: Secure range-independent localization forWireless sensor networks," in Proc. ACM WiSe, 2004, pp. 21-30.
[9]
L. Lazos, R. Poovendran, and S. Capkun, "ROPE: Robust position estimation in wireless sensor networks," in Proc. IPSN, 2005, pp. 324-331.
[10]
D. Liu and P. Ning, "Establishing pairwise keys in distributed sensor networks," in Proc. ACM CCS, 2003, pp. 52-56.
[11]
R. Nagpal, H. Shrobe, and J. Bachrach, "Organizing a global coordinate system from local information on an ad hoc sensor network," in Proc. IPSN, 2003, LNCS 2634, pp. 333-348.
[12]
D. Nicolescu and B. Nath, "Ad-hoc positioning systems (APS)," in Proc. IEEE GLOBECOM, 2001, vol. 5, pp. 2926-2931.
[13]
A. Perrig, R. Szewczyk, V. Wen, D. Culer, and J. Tygar, "SPINS: Security protocols for sensor networks," in Proc. ACM MobiCom, 2001, pp. 189-199.
[14]
B. Przydatek, D. Song, and A. Perrig, "SIA: Secure information aggregation in sensor networks," in Proc. ACM SenSys, 2003, pp. 255-265.
[15]
K. Ren, W. Lou, and Y. Zhang, "LEDS: Providing location-aware end-to-end data security in wireless sensor networks," in Proc. IEEE INFOCOM, 2006, pp. 1-12.
[16]
"TinyOS community forum," {Online}. Available: http://www.tinyos.net
[17]
A. Woo, T. Tong, and D. Culler, "Taming the underlying challenges of reliable multihop routing in sensor networks," in Proc. ACM SenSys, 2003, pp. 14-27.
[18]
H. Yang and S. Lu, "Commutative cipher based en-route filtering in wireless sensor networks," in Proc. IEEE VTC, 2004, vol. 2, pp. 1223-1227.
[19]
H. Yang, F. Ye, Y. Yuan, S. Lu, and W. Arbaugh, "Toward resilient security in wireless sensor networks," in Proc. ACM MobiHoc, 2005, pp. 34-45.
[20]
F. Ye, H. Luo, S. Lu, and L. Zhang, "Statistical en-route detection and filtering of injected false data in sensor networks," in Proc. IEEE INFOCOM, 2004, vol. 4, pp. 2446-2457.
[21]
Y. Yu, R. Govindan, and D. Estrin, "Geographical and energy aware routing: A recursive data dissemination protocol for wireless sensor networks," Comput. Sci. Dept., Univ. California, Los Angeles, UCLA-CSD TR-01-0023, 2001.
[22]
Z. Yu and Y. Guan, "A dynamic en-route scheme for filtering false data injection in wireless sensor networks," in Proc. IEEE INFOCOM, 2006, pp. 1-12.
[23]
S. Zhu, S. Setia, and S. Jajodia, "LEAP: Efficient security mechanisms for large-scale distributed sensor networks," in Proc. ACM CCS, 2003, pp. 62-72.
[24]
S. Zhu, S. Setia, S. Jajodia, and P. Ning, "An interleaved hop-by-Hop authentication scheme for filtering of injected false data in sensor networks," in Proc. IEEE Symp. Security Privacy, 2004, pp. 259-271.

Cited By

View all
  • (2023)A survey of energy-efficient clustering routing protocols for wireless sensor networks based on metaheuristic approachesArtificial Intelligence Review10.1007/s10462-023-10402-w56:9(9699-9770)Online publication date: 11-Feb-2023
  • (2020)Rank-Based Report Filtering Scheme (RRFS) for Verifying Phoney Reports in Wireless Sensor NetworksWireless Communications & Mobile Computing10.1155/2020/27859602020Online publication date: 1-Jan-2020
  • (2019)A Fuzzy System based Approach to Extend Network Lifetime for En-Route Filtering Schemes in WSNsProceedings of the 2019 11th International Conference on Computer and Automation Engineering10.1145/3313991.3314004(118-121)Online publication date: 23-Feb-2019
  • Show More Cited By

Index Terms

  1. A dynamic en-route filtering scheme for data reporting in wireless sensor networks

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image IEEE/ACM Transactions on Networking
      IEEE/ACM Transactions on Networking  Volume 18, Issue 1
      February 2010
      332 pages

      Publisher

      IEEE Press

      Publication History

      Published: 01 February 2010
      Revised: 19 December 2007
      Received: 13 December 2006
      Published in TON Volume 18, Issue 1

      Author Tags

      1. data reporting
      2. en-route filtering scheme
      3. wireless sensor networks

      Qualifiers

      • Article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 26 Jan 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2023)A survey of energy-efficient clustering routing protocols for wireless sensor networks based on metaheuristic approachesArtificial Intelligence Review10.1007/s10462-023-10402-w56:9(9699-9770)Online publication date: 11-Feb-2023
      • (2020)Rank-Based Report Filtering Scheme (RRFS) for Verifying Phoney Reports in Wireless Sensor NetworksWireless Communications & Mobile Computing10.1155/2020/27859602020Online publication date: 1-Jan-2020
      • (2019)A Fuzzy System based Approach to Extend Network Lifetime for En-Route Filtering Schemes in WSNsProceedings of the 2019 11th International Conference on Computer and Automation Engineering10.1145/3313991.3314004(118-121)Online publication date: 23-Feb-2019
      • (2018)Recent Advances in Attacks, Technical Challenges, Vulnerabilities and Their Countermeasures in Wireless Sensor NetworksWireless Personal Communications: An International Journal10.1007/s11277-017-4962-098:2(2037-2077)Online publication date: 1-Jan-2018
      • (2017)Context-Aware Architecture for Probabilistic Voting-based Filtering Scheme in Sensor NetworksIEEE Transactions on Mobile Computing10.1109/TMC.2016.264121916:10(2751-2763)Online publication date: 30-Aug-2017
      • (2017)En-Route Filtering Techniques in Wireless Sensor NetworksWireless Personal Communications: An International Journal10.1007/s11277-017-4197-096:1(697-739)Online publication date: 1-Sep-2017
      • (2015)Fuzzy-Based adaptive countering method against false endorsement insertion attacks in wireless sensor networksInternational Journal of Distributed Sensor Networks10.5555/2836620.28366272015(7-7)Online publication date: 1-Jan-2015
      • (2015)Reliable anonymous secure packet forwarding scheme for wireless sensor networksComputers and Electrical Engineering10.1016/j.compeleceng.2015.08.02148:C(405-416)Online publication date: 1-Nov-2015
      • (2015)A fuzzy rule-based path configuration method for LEAP in sensor networksAd Hoc Networks10.1016/j.adhoc.2015.03.00531:C(63-79)Online publication date: 1-Aug-2015
      • (2015)Extending the network lifetime by pre-deterministic key distribution in CCEF in wireless sensor networksWireless Networks10.1007/s11276-015-0941-021:8(2799-2809)Online publication date: 1-Nov-2015
      • Show More Cited By

      View Options

      Login options

      Full Access

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media