Abstract
When large-scale wireless sensor networks are deployed in hostile environments, the adversary may compromise some sensor nodes and use them to generate false sensing reports or to modify the reports sent by other nodes. Such false events can cause the user to make bad decisions. They can also waste a significant amount of network resources. Unfortunately, most current security designs have drawbacks; they either require their own routing protocols to be used, or lose legitimate events stochastically and completely break down when more than a fixed threshold number of nodes are compromised. We propose a new method for detecting false events that does not suffer from these problems. When we set the probability of losing legitimate events to 1%, our proposal method can detect more false events than related method can. We demonstrate this by mathematical analysis and simulation.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Perrig, A., Szewczyk, R., Wen, V., Culler, D.E., Tygar, J.D.: SPINS: security protocols for sensor networks. In: Mobile Computing and Networking (MobiCom), pp. 189–199 (2001)
Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: CCS 2002. Proceedings of the 9th ACM conference on Computer and communications security, pp. 41–47. ACM Press, New York, NY, USA (2002)
Ye, F., Luo, H., Lu, S., Zhang, L.: Statistical en-route filtering of injected false data in sensor networks. IEEE Journal on Selected Areas in Communications, Special Issue on Self-organizing Distributed Collaborative Sensor Networks 23(4), 839–850 (2005)
Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: Proceedings of the 2003 IEEE Symposium on Security and Privacy, pp. 197–213. IEEE Computer Society Press, Washington, DC, USA (2003)
Yang, H., Ye, F., Yuan, Y., Lu, S., Arbaugh, W.: Toward resilient security in wireless sensor networks. In: Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing, pp. 34–45. ACM Press, New York, NY, USA (2005)
Zhu, S., Setia, S., Jajodia, S., Ning, P.: An interleaved hop-by-hop authentication scheme for filtering false data injection in sensor networks. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 259–271. IEEE Computer Society Press, Los Alamitos (2004)
Kraub, C., Schneider, M., Bayarou, K., Eckert, C.: Stef: A secure ticket-based en-route filtering scheme for wireless sensor networks. In: ARES 2007. The Second International Conference on Availability, Reliability and Security, pp. 310–317. IEEE Computer Society Press, Los Alamitos, CA, USA (2007)
Bruck, J., Gao, J., Jiang, A.A.: Localization and routing in sensor networks by local angle information. In: MobiHoc 2005. Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing, pp. 181–192. ACM Press, New York, NY, USA (2005)
Stoleru, R., Vicaire, P., He, T., Stankovic, J.A.: Stardust: a flexible architecture for passive localization in wireless sensor networks. In: SenSys 2006. Proceedings of the 4th international conference on Embedded networked sensor systems, pp. 57–70. ACM Press, New York, NY, USA (2006)
Wood, A.D., Stankovic, J.A.: Denial of service in sensor networks. Computer 35(10), 54–62 (2002)
Ye, F., Zhong, G., Lu, S., Zhang, L.: Gradient broadcast: a robust data delivery protocol for large scale sensor networks. Wirel. Netw. 11(3), 285–298 (2005)
Liu, D., Ning, P.: Establishing pairwise keys in distributed sensor networks. In: CCS 2003. Proceedings of the 10th ACM conference on Computer and communications security, pp. 52–61. ACM Press, New York, NY, USA (2003)
Du, W., Deng, J., Han, Y.S., Chen, S., Varshney, P.K.: A key management scheme for wireless sensor networks using deployment knowledge. In: INFOCOM (2004)
Yang, Y., Wang, X., Zhu, S., Cao, G.: Sdap: a secure hop-by-hop data aggregation protocol for sensor networks. In: MobiHoc 2006. Proceedings of the seventh ACM international symposium on Mobile ad hoc networking and computing, pp. 356–367. ACM Press, New York, NY, USA (2006)
Chan, H., Perrig, A., Song, D.: Secure hierarchical in-network aggregation in sensor networks. In: CCS 2006. Proceedings of the 13th ACM conference on Computer and communications security, pp. 278–287. ACM Press, New York, NY, USA (2006)
Krawczyk, H., Bellare, M., Canetti, R.: HMAC: Keyed-hashing for message authentication IETF - Network Working Group, RFC2104 (February 1997)
Zhang, W., Cao, G.: Group rekeying for filtering false data in sensor networks: a predistribution and local collaboration-based approach. In: INFOCOM, pp. 503–514 (2005)
Li, W., Zhang, Y., Yang, J.: Dynamic authentication-key re-assignment for reliable report delivery. In: IEEE International Conference on Mobile Adhoc and Sensor Systems (MASS), pp. 467–476. IEEE Computer Society Press, Los Alamitos (2006)
Li, F., Wu, J.: A probabilistic voting-based filtering scheme in wireless sensor networks. In: Proceeding of the 2006 international conference on Communications and mobile computing, pp. 27–32. ACM Press, New York, NY, USA (2006)
Shrivastava, N., Madhow, R.M.U., Suri, S.: Target tracking with binary proximity sensors: fundamental limits, minimal descriptions, and algorithms. In: SenSys 2006. Proceedings of the 4th international conference on Embedded networked sensor systems, pp. 251–264. ACM Press, New York, NY, USA (2006)
Tsudik, G.: Message authentication with one-way hash functions. SIGCOMM Comput. Commun. Rev. 22(5), 29–38 (1992)
Karp, B., Kung, H.T.: GPSR: Greedy perimeter stateless routing for wireless networks. In: Mobile Computing and Networking (MobiCom), pp. 243–254 (2000)
Bloom, B.H.: Space/time trade-offs in hash coding with allowable errors. Commun. ACM 13(7), 422–426 (1970)
Sei, Y., Matsuzaki, K., Honiden, S.: Ringed filters for peer-to-peer keyword searching. In: ICCCN. IEEE 16th International Conference on Computer Communications and Networks, IEEE Computer Society Press, Los Alamitos (to appear, 2007)
Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: MobiCom 2000. Proceedings of the 6th annual international conference on Mobile computing and networking, pp. 255–265. ACM Press, New York, NY, USA (2000)
Wang, G., Zhang, W., Cao, G., Porta, T.: On supporting distributed collaboration in sensor networks. In: IEEE Military Communications Conference (MILCOM) (2003)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Sei, Y., Honiden, S. (2007). Resilient Security for False Event Detection Without Loss of Legitimate Events in Wireless Sensor Networks. In: Meersman, R., Tari, Z. (eds) On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS. OTM 2007. Lecture Notes in Computer Science, vol 4803. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-76848-7_33
Download citation
DOI: https://doi.org/10.1007/978-3-540-76848-7_33
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-76846-3
Online ISBN: 978-3-540-76848-7
eBook Packages: Computer ScienceComputer Science (R0)