Skip to main content

An Effective Secure Routing for False Data Injection Attack in Wireless Sensor Network

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 4773))

Abstract

The authenticity of the data collected by the sink is pivotal to a lot of WSN applications. But as the monitoring environment and objects are more and more complex, traditional secure protocols are not fit for the false data injection attack. In this paper, EASY, an effective secure routing for false data injection attack is presented. EASY can effectively resolve the contradiction between security requirement and additional load and guarantee to get the required security with the satiable overload.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Akyildiz, F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A survey on sensor networks. IEEE Communications Magazine 40(8), 102–114 (2002)

    Article  Google Scholar 

  2. Holman, R., Stanley, J., Ozkan-Haller, T.: Applying Video Sensor Networks to Nearshore Environment Monitoring. IEEE Pervasive Computing 2(4), 14–21 (2003)

    Article  Google Scholar 

  3. Estrin, D., et al.: Directed Diffusion for Wireless Sensor Networking. IEEE/ACM Transaction on Networking (Februray 2003)

    Google Scholar 

  4. Estrin, D., et al.: Geographical and Energy-Aware Routing: A Recursive Data Dissemination Protocol for Wireless Sensor Networks. UCLA Computer Science Department Technical Report, UCLA-CSD TR-01-0023 (May 2001)

    Google Scholar 

  5. Ganesan, D., Govindan, R., Shenker, S., Estrin, D.: Highly-resilient,energy-efficient multipath routing in wireless sensor networks. Mobile Computing and Communications Review(MC2R) 1(2) (2002)

    Google Scholar 

  6. Deng, J., Han, R., Mishra, S.: INSENS: intrusion-tolerant routing in wireless sensor networks. Technical Report CUCS-939-02, Department of Computer Science, University of Colorado (2002)

    Google Scholar 

  7. Ye, F., et al.: Statistical En-Route Filtering of Injected False Datasensor Networks. In: Proc. IEEE INFOCOM, Hong Kong (2004)

    Google Scholar 

  8. Wang, G., et al.: On supporting Distributed Collaboration Sensor Networks. In: Proc. MILCOM (2003)

    Google Scholar 

  9. Zhu, S., et al.: An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks. In: Proc. IEEE Symp. Security and Privacy, Oakland, CA, pp. 259–271 (May 2004)

    Google Scholar 

  10. Akyildiz, K.R.: A survey on wireless multimedia sensor networks. Computer Networks 51(4), 921–960 (2007)

    Article  MathSciNet  Google Scholar 

  11. Crossbow wireless sensor platform. http://www.xbow.com/Products/WirelessSensorNetworks.htm

  12. Traynor, P., Choi, H., Cao, G., Zhu, S., La Porta, T.: Establishing Pair-wise Keys in Heterogeneous Sensor Networks. In: IEEE Infocom 2006, IEEE Computer Society Press, Los Alamitos (2006)

    Google Scholar 

  13. Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM conference on Computer and communications security, pp. 41–47. ACM Press, New York (2002)

    Chapter  Google Scholar 

  14. Merkle, R.: Secure communication over insecure channels. Communications of the ACM 21(4), 294–299 (1978)

    Article  Google Scholar 

  15. Chadha, A., Lius, Y., Das, S.: Group key distribution via local collaboration in wireless sensor networks. In: Proceedings of IEEE SECON 2005, Santa Clara, CA (September 2005)

    Google Scholar 

  16. Perrig, A., Sivalingam, R., et al.: SPINS: Security protocols for sensor networks. Wireless Networks 8(5), 521–534 (2002)

    Article  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Shingo Ata Choong Seon Hong

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zhu, Z., Tan, Q., Zhu, P. (2007). An Effective Secure Routing for False Data Injection Attack in Wireless Sensor Network. In: Ata, S., Hong, C.S. (eds) Managing Next Generation Networks and Services. APNOMS 2007. Lecture Notes in Computer Science, vol 4773. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-75476-3_46

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-75476-3_46

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-75475-6

  • Online ISBN: 978-3-540-75476-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics