Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article

Fuzzy-Based adaptive countering method against false endorsement insertion attacks in wireless sensor networks

Published: 01 January 2015 Publication History

Abstract

Wireless sensor networks (WSNs) are vulnerable to false endorsement insertion attacks (FEIAs), where a malicious adversary intentionally inserts incorrect endorsements into legitimate sensing reports in order to block notifications of real events. A centralized solution can detect and adaptively counter FEIAs while conserving the energy of the forwarding nodes because it does not make the nodes verify reports using cryptographic operations. However, to apply this solution to a WSN, the users must carefully select 10 or more security parameters, which are used to determine the occurrences of FEIAs. Thus, an inappropriate choice of a single parameter might result in the misinterpretation of or misdetection of FEIAs. Therefore, the present study proposes a fuzzy-based centralized method for detecting and adaptively countering FEIAs in dense WSNs, where two fuzzy rule-based systems are used to detect an FEIA and to select the most effective counter measure against the FEIA. A major benefit of the proposed method is that the fuzzy systems can be optimized automatically by combining a genetic algorithm and a simulation. Thus, users only need to write a model of the WSN to apply the proposed method to a WSN. The improved performance with this method is demonstrated by simulation results.

References

[1]
I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "A survey on sensor networks," IEEE Communications Magazine, vol. 40, no. 8, pp. 102-114, 2002.
[2]
F. Ye, H. Luo, S. Lu, and L. Zhang, "Statistical en-route filtering of injected false data in sensor networks," IEEE Journal on Selected Areas in Communications, vol. 23, no. 4, pp. 839-850, 2005.
[3]
H. Yu, J. He, R. Liu, and D. Ji, "On the security of data collection and transmission from wireless sensor networks in the context of Internet of things," International Journal of Distributed Sensor Networks, vol. 2013, Article ID 806505, 13 pages, 2013.
[4]
H. Yang and S. Lu, "Commutative cipher based en-route filtering in wireless sensor networks," in Proceedings of the 60th IEEE Vehicular Technology Conference (VTC '04), vol. 2, pp. 1223-1227, 2004.
[5]
S. Zhu, S. Setia, S. Jajodia, and P. Ning, "Interleaved hop-by-hop authentication against false data injection attacks in sensor networks," ACM Transactions on Sensor Networks, vol. 3, no. 3, Article ID 1267062, 2007.
[6]
F. Li, A. Srinivasan, and J. Wu, "PVFS: a probabilistic voting-based filtering scheme in wireless sensor networks," International Journal of Security and Networks, vol. 3, no. 3, pp. 173-182, 2008.
[7]
T. P. Nghiem and T. H. Cho, "A fuzzy-based interleaved multihop authentication scheme in wireless sensor networks," Journal of Parallel and Distributed Computing, vol. 69, no. 5, pp. 441- 450, 2009.
[8]
Z. Yu and Y. Guan, "A dynamic en-route filtering scheme for data reporting in wireless sensor networks," IEEE/ACM Transactions on Networking, vol. 18, no. 1, pp. 150-163, 2010.
[9]
H. Y. Lee, T. H. Cho, and H.-J. Kim, "Fuzzy-based detection of injected false data in wireless sensor networks," Communications in Computer and Information Science, vol. 76, pp. 128-137, 2010.
[10]
Z. Liu, J. Wang, and X. Zhang, "A false data filtering scheme using cluster-based organization in sensor networks," in Proceedings of the IEEE International Conference on Communications (ICC '11), pp. 1-5, 2011.
[11]
J. Wang, Z. Liu, S. Zhang, and X. Zhang, "Defending collaborative false data injection attacks in wireless sensor networks," Information Sciences, vol. 254, pp. 39-53, 2014.
[12]
M. S. Kim and T. H. Cho, "A multipath en-route filtering method for dropping reports in sensor networks," IEICE Transactions on Information and Systems, vol. E90-D, no. 12, pp. 2108-2109, 2007.
[13]
C. Krauß, M. Schneider, and C. Eckert, "Defending against false-endorsement-based DoS attacks in wireless sensor networks," in Proceedings of the 1st ACM Conference on Wireless Network Security (WiSec '08), pp. 13-23, April 2008.
[14]
C.-M. Yu, Y.-T. Tsou, C.-S. Lu, and S.-Y. Kuo, "Constrained function-based message authentication for sensor networks," IEEE Transactions on Information Forensics and Security, vol. 6, no. 2, pp. 407-425, 2011.
[15]
H. Y. Lee and T. H. Cho, "A scheme for adaptively countering application layer security attacks in wireless sensor networks," IEICE Transactions on Communications, vol. 93, no. 7, pp. 1881- 1889, 2010.
[16]
H. Y. Lee and T. H. Cho, "Optimized fuzzy adaptive filtering for ubiquitous sensor networks," IEICE Transactions on Communications, vol. E94-B, no. 6, pp. 1648-1656, 2011.
[17]
Advanticsys, http://www.advanticsys.com/.
[18]
M. Takács, "Approximate reasoning in fuzzy systems based on pseudo-analysis and uninorm residuum," Acta Polytechnica Hungarica, vol. 1, no. 2, pp. 49-62, 2004.
[19]
H. X. Li and C. L. P. Chen, "The equivalence between fuzzy logic systems and feedforward neural networks," IEEE Transactions on Neural Networks, vol. 11, no. 2, pp. 356-365, 2000.
[20]
N. Serrano and H. Seraji, "Landing site selection using fuzzy rule-based reasoning," in Proceedings of the IEEE International Conference on Robotics and Automation (ICRA '07), pp. 4899- 4904, Roma, Italy, April 2007.
[21]
S. H. Chi and T. H. Cho, "Fuzzy logic based propagation limiting method for message routing in wireless sensor networks," in Computational Science and Its Applications--ICCSA 2006, vol. 3983 of Lecture Notes in Computer Science, pp. 58-67, Springer, Berlin, Germany, 2006.
[22]
A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler, "SPINS: security protocols for sensor networks," Wireless Networks, vol. 8, no. 5, pp. 521-534, 2002.
[23]
H. Y. Lee and T. H. Cho, "False negative-resilient report generation for the statistical filtering in sensor networks," in Proceedings of the International Conference on Network and Mobile Computing (NMC '06), p. 27, 2006.
[24]
C. Baier and J. P. Katoen, Principles of Model Checking, MIT Press, 2008.
  1. Fuzzy-Based adaptive countering method against false endorsement insertion attacks in wireless sensor networks

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image International Journal of Distributed Sensor Networks
    International Journal of Distributed Sensor Networks  Volume 2015, Issue
    Special issue on Trust, Security, and Privacy in Next-Generation Wireless Sensor Networks 2014
    January 2015
    115 pages
    ISSN:1550-1329
    EISSN:1550-1477
    Issue’s Table of Contents

    Publisher

    Hindawi Limited

    London, United Kingdom

    Publication History

    Published: 01 January 2015
    Accepted: 07 September 2014
    Revised: 19 August 2014
    Received: 02 June 2014

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 3
      Total Downloads
    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 03 Feb 2025

    Other Metrics

    Citations

    View Options

    View options

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media