Abstract
The authenticity of the data collected by the sink is pivotal to a lot of WSN applications. But as the monitoring environment and objects are more and more complex, traditional secure protocols are not fit for the false data injection attack. In this paper, EASY, an effective secure routing for false data injection attack is presented. EASY can effectively resolve the contradiction between security requirement and additional load and guarantee to get the required security with the satiable overload.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Akyildiz, F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A survey on sensor networks. IEEE Communications Magazine 40(8), 102–114 (2002)
Holman, R., Stanley, J., Ozkan-Haller, T.: Applying Video Sensor Networks to Nearshore Environment Monitoring. IEEE Pervasive Computing 2(4), 14–21 (2003)
Estrin, D., et al.: Directed Diffusion for Wireless Sensor Networking. IEEE/ACM Transaction on Networking (Februray 2003)
Estrin, D., et al.: Geographical and Energy-Aware Routing: A Recursive Data Dissemination Protocol for Wireless Sensor Networks. UCLA Computer Science Department Technical Report, UCLA-CSD TR-01-0023 (May 2001)
Ganesan, D., Govindan, R., Shenker, S., Estrin, D.: Highly-resilient,energy-efficient multipath routing in wireless sensor networks. Mobile Computing and Communications Review(MC2R) 1(2) (2002)
Deng, J., Han, R., Mishra, S.: INSENS: intrusion-tolerant routing in wireless sensor networks. Technical Report CUCS-939-02, Department of Computer Science, University of Colorado (2002)
Ye, F., et al.: Statistical En-Route Filtering of Injected False Datasensor Networks. In: Proc. IEEE INFOCOM, Hong Kong (2004)
Wang, G., et al.: On supporting Distributed Collaboration Sensor Networks. In: Proc. MILCOM (2003)
Zhu, S., et al.: An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks. In: Proc. IEEE Symp. Security and Privacy, Oakland, CA, pp. 259–271 (May 2004)
Akyildiz, K.R.: A survey on wireless multimedia sensor networks. Computer Networks 51(4), 921–960 (2007)
Crossbow wireless sensor platform. http://www.xbow.com/Products/WirelessSensorNetworks.htm
Traynor, P., Choi, H., Cao, G., Zhu, S., La Porta, T.: Establishing Pair-wise Keys in Heterogeneous Sensor Networks. In: IEEE Infocom 2006, IEEE Computer Society Press, Los Alamitos (2006)
Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM conference on Computer and communications security, pp. 41–47. ACM Press, New York (2002)
Merkle, R.: Secure communication over insecure channels. Communications of the ACM 21(4), 294–299 (1978)
Chadha, A., Lius, Y., Das, S.: Group key distribution via local collaboration in wireless sensor networks. In: Proceedings of IEEE SECON 2005, Santa Clara, CA (September 2005)
Perrig, A., Sivalingam, R., et al.: SPINS: Security protocols for sensor networks. Wireless Networks 8(5), 521–534 (2002)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zhu, Z., Tan, Q., Zhu, P. (2007). An Effective Secure Routing for False Data Injection Attack in Wireless Sensor Network. In: Ata, S., Hong, C.S. (eds) Managing Next Generation Networks and Services. APNOMS 2007. Lecture Notes in Computer Science, vol 4773. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-75476-3_46
Download citation
DOI: https://doi.org/10.1007/978-3-540-75476-3_46
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-75475-6
Online ISBN: 978-3-540-75476-3
eBook Packages: Computer ScienceComputer Science (R0)