Skip to main content

Resilient Security for False Event Detection Without Loss of Legitimate Events in Wireless Sensor Networks

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 4803))

Abstract

When large-scale wireless sensor networks are deployed in hostile environments, the adversary may compromise some sensor nodes and use them to generate false sensing reports or to modify the reports sent by other nodes. Such false events can cause the user to make bad decisions. They can also waste a significant amount of network resources. Unfortunately, most current security designs have drawbacks; they either require their own routing protocols to be used, or lose legitimate events stochastically and completely break down when more than a fixed threshold number of nodes are compromised. We propose a new method for detecting false events that does not suffer from these problems. When we set the probability of losing legitimate events to 1%, our proposal method can detect more false events than related method can. We demonstrate this by mathematical analysis and simulation.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Perrig, A., Szewczyk, R., Wen, V., Culler, D.E., Tygar, J.D.: SPINS: security protocols for sensor networks. In: Mobile Computing and Networking (MobiCom), pp. 189–199 (2001)

    Google Scholar 

  2. Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: CCS 2002. Proceedings of the 9th ACM conference on Computer and communications security, pp. 41–47. ACM Press, New York, NY, USA (2002)

    Chapter  Google Scholar 

  3. Ye, F., Luo, H., Lu, S., Zhang, L.: Statistical en-route filtering of injected false data in sensor networks. IEEE Journal on Selected Areas in Communications, Special Issue on Self-organizing Distributed Collaborative Sensor Networks 23(4), 839–850 (2005)

    Google Scholar 

  4. Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: Proceedings of the 2003 IEEE Symposium on Security and Privacy, pp. 197–213. IEEE Computer Society Press, Washington, DC, USA (2003)

    Google Scholar 

  5. Yang, H., Ye, F., Yuan, Y., Lu, S., Arbaugh, W.: Toward resilient security in wireless sensor networks. In: Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing, pp. 34–45. ACM Press, New York, NY, USA (2005)

    Chapter  Google Scholar 

  6. Zhu, S., Setia, S., Jajodia, S., Ning, P.: An interleaved hop-by-hop authentication scheme for filtering false data injection in sensor networks. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 259–271. IEEE Computer Society Press, Los Alamitos (2004)

    Google Scholar 

  7. Kraub, C., Schneider, M., Bayarou, K., Eckert, C.: Stef: A secure ticket-based en-route filtering scheme for wireless sensor networks. In: ARES 2007. The Second International Conference on Availability, Reliability and Security, pp. 310–317. IEEE Computer Society Press, Los Alamitos, CA, USA (2007)

    Google Scholar 

  8. Bruck, J., Gao, J., Jiang, A.A.: Localization and routing in sensor networks by local angle information. In: MobiHoc 2005. Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing, pp. 181–192. ACM Press, New York, NY, USA (2005)

    Chapter  Google Scholar 

  9. Stoleru, R., Vicaire, P., He, T., Stankovic, J.A.: Stardust: a flexible architecture for passive localization in wireless sensor networks. In: SenSys 2006. Proceedings of the 4th international conference on Embedded networked sensor systems, pp. 57–70. ACM Press, New York, NY, USA (2006)

    Chapter  Google Scholar 

  10. Wood, A.D., Stankovic, J.A.: Denial of service in sensor networks. Computer 35(10), 54–62 (2002)

    Article  Google Scholar 

  11. Ye, F., Zhong, G., Lu, S., Zhang, L.: Gradient broadcast: a robust data delivery protocol for large scale sensor networks. Wirel. Netw. 11(3), 285–298 (2005)

    Article  Google Scholar 

  12. Liu, D., Ning, P.: Establishing pairwise keys in distributed sensor networks. In: CCS 2003. Proceedings of the 10th ACM conference on Computer and communications security, pp. 52–61. ACM Press, New York, NY, USA (2003)

    Chapter  Google Scholar 

  13. Du, W., Deng, J., Han, Y.S., Chen, S., Varshney, P.K.: A key management scheme for wireless sensor networks using deployment knowledge. In: INFOCOM (2004)

    Google Scholar 

  14. Yang, Y., Wang, X., Zhu, S., Cao, G.: Sdap: a secure hop-by-hop data aggregation protocol for sensor networks. In: MobiHoc 2006. Proceedings of the seventh ACM international symposium on Mobile ad hoc networking and computing, pp. 356–367. ACM Press, New York, NY, USA (2006)

    Chapter  Google Scholar 

  15. Chan, H., Perrig, A., Song, D.: Secure hierarchical in-network aggregation in sensor networks. In: CCS 2006. Proceedings of the 13th ACM conference on Computer and communications security, pp. 278–287. ACM Press, New York, NY, USA (2006)

    Chapter  Google Scholar 

  16. Krawczyk, H., Bellare, M., Canetti, R.: HMAC: Keyed-hashing for message authentication IETF - Network Working Group, RFC2104 (February 1997)

    Google Scholar 

  17. Zhang, W., Cao, G.: Group rekeying for filtering false data in sensor networks: a predistribution and local collaboration-based approach. In: INFOCOM, pp. 503–514 (2005)

    Google Scholar 

  18. Li, W., Zhang, Y., Yang, J.: Dynamic authentication-key re-assignment for reliable report delivery. In: IEEE International Conference on Mobile Adhoc and Sensor Systems (MASS), pp. 467–476. IEEE Computer Society Press, Los Alamitos (2006)

    Chapter  Google Scholar 

  19. Li, F., Wu, J.: A probabilistic voting-based filtering scheme in wireless sensor networks. In: Proceeding of the 2006 international conference on Communications and mobile computing, pp. 27–32. ACM Press, New York, NY, USA (2006)

    Chapter  Google Scholar 

  20. Shrivastava, N., Madhow, R.M.U., Suri, S.: Target tracking with binary proximity sensors: fundamental limits, minimal descriptions, and algorithms. In: SenSys 2006. Proceedings of the 4th international conference on Embedded networked sensor systems, pp. 251–264. ACM Press, New York, NY, USA (2006)

    Chapter  Google Scholar 

  21. Tsudik, G.: Message authentication with one-way hash functions. SIGCOMM Comput. Commun. Rev. 22(5), 29–38 (1992)

    Article  Google Scholar 

  22. Karp, B., Kung, H.T.: GPSR: Greedy perimeter stateless routing for wireless networks. In: Mobile Computing and Networking (MobiCom), pp. 243–254 (2000)

    Google Scholar 

  23. Bloom, B.H.: Space/time trade-offs in hash coding with allowable errors. Commun. ACM 13(7), 422–426 (1970)

    Article  MATH  Google Scholar 

  24. Sei, Y., Matsuzaki, K., Honiden, S.: Ringed filters for peer-to-peer keyword searching. In: ICCCN. IEEE 16th International Conference on Computer Communications and Networks, IEEE Computer Society Press, Los Alamitos (to appear, 2007)

    Google Scholar 

  25. Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: MobiCom 2000. Proceedings of the 6th annual international conference on Mobile computing and networking, pp. 255–265. ACM Press, New York, NY, USA (2000)

    Chapter  Google Scholar 

  26. Wang, G., Zhang, W., Cao, G., Porta, T.: On supporting distributed collaboration in sensor networks. In: IEEE Military Communications Conference (MILCOM) (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Robert Meersman Zahir Tari

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Sei, Y., Honiden, S. (2007). Resilient Security for False Event Detection Without Loss of Legitimate Events in Wireless Sensor Networks. In: Meersman, R., Tari, Z. (eds) On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS. OTM 2007. Lecture Notes in Computer Science, vol 4803. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-76848-7_33

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-76848-7_33

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-76846-3

  • Online ISBN: 978-3-540-76848-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics