Abstract
As the WSN multi-media applications go deep into the military, monitor and other data-sensitive areas, stream data have become the main data processing objects instead of scalar data in WMSN. Because of the difference between the application environments and data features of stream data and scalar data, traditional secure routing for scalar data is not fit for stream data. In this paper, SOAR, a secure route for the false data injection attack model is presented. SOAR works in the stream data transfer mode and randomly detects the false data injection attacks. SOAR guarantees that the base stations receive small percentage of false packages with rather low load.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Akyildiz, F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A survey on sensor networks. IEEE Communications Magazine 40(8), 102–114 (2002)
Holman, R., Stanley, J., Ozkan-Haller, T.: Applying Video Sensor Networks to Nearshore Environment Monitoring. IEEE Pervasive Computing 2(4), 14–21 (2003)
Estrin, D., et al.: Directed Diffusion for Wireless Sensor Networking. IEEE/ACM Transactions on Networking (Februray 2003)
Yu, Y., Govindan, R., Estrin, D.: Geographical and Energy Aware Routing: A Recursive Data Dissemination Protocol for Wireless Sensor Networks. UCLA Computer Science Department, Tech. Rep. UCLA/CSD-TR-01-0023 (May 2001)
Ganesan, D., Govindan, R., Shenker, S., Estrin, D.: Highly-resilient,energy-efficient multipath routing in wireless sensor networks. Mobile Computing and Communications Review (MC2R)Â 1(2) (2002)
Deng, J., Han, R., Mishra, S.: INSENS: intrusion-tolerant routing in wireless sensor networks. Technical Report CUCS-939-02, Department of Computer Science, University of Colorado (2002)
Ye, F., et al.: Statistical En-Route Filtering of Injected False Datasensor Networks. In: Proc. IEEE INFOCOM, Hong Kong (2004)
Zhu, S., et al.: An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks. In: Proc. IEEE Symp. Security and Privacy, Oakland, CA, pp. 259–271 (May 2004)
Zhu, et al.: An effective secure routing for false data injection attack in wireless sensor network. In: Proceedings of the Asia-Pacific Network Operations and Management Symposium, pp. 457–465 (2007)
Stuber, G.L.: Principles of Mobile Communication, 2nd edn. Kluwer Academic, Boston (2001)
Lazos, L., et al.: ROPE: Robust position estimation in wireless sensor network. In: IPSN 2005. Proc. Int. Symp. Inform. Process. Sensor Networks, pp. 324–331. IEEE, CA (2005)
Anderson, R., Chan, H., Perrig, A.: Key infection: Smart trust for smart dust. In: ICNP 2004. Proc. IEEE Int. Conf. Network Protocols, pp. 206–215. IEEE Comput. Soc., CA (2004)
Wang, G., et al.: On supporting Distributed Collaboration Sensor Networks. In: Proc. MILCOM (2003)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zhu, Z., Tan, Q., Zhu, P. (2007). A Stream-Data Oriented Secure Routing Protocol in Wireless Sensor Networks. In: Zhang, H., Olariu, S., Cao, J., Johnson, D.B. (eds) Mobile Ad-Hoc and Sensor Networks. MSN 2007. Lecture Notes in Computer Science, vol 4864. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77024-4_76
Download citation
DOI: https://doi.org/10.1007/978-3-540-77024-4_76
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-77023-7
Online ISBN: 978-3-540-77024-4
eBook Packages: Computer ScienceComputer Science (R0)