Skip to main content

A Stream-Data Oriented Secure Routing Protocol in Wireless Sensor Networks

  • Conference paper
Mobile Ad-Hoc and Sensor Networks (MSN 2007)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 4864))

Included in the following conference series:

  • 1010 Accesses

Abstract

As the WSN multi-media applications go deep into the military, monitor and other data-sensitive areas, stream data have become the main data processing objects instead of scalar data in WMSN. Because of the difference between the application environments and data features of stream data and scalar data, traditional secure routing for scalar data is not fit for stream data. In this paper, SOAR, a secure route for the false data injection attack model is presented. SOAR works in the stream data transfer mode and randomly detects the false data injection attacks. SOAR guarantees that the base stations receive small percentage of false packages with rather low load.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Akyildiz, F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A survey on sensor networks. IEEE Communications Magazine 40(8), 102–114 (2002)

    Article  Google Scholar 

  2. Holman, R., Stanley, J., Ozkan-Haller, T.: Applying Video Sensor Networks to Nearshore Environment Monitoring. IEEE Pervasive Computing 2(4), 14–21 (2003)

    Article  Google Scholar 

  3. Estrin, D., et al.: Directed Diffusion for Wireless Sensor Networking. IEEE/ACM Transactions on Networking (Februray 2003)

    Google Scholar 

  4. Yu, Y., Govindan, R., Estrin, D.: Geographical and Energy Aware Routing: A Recursive Data Dissemination Protocol for Wireless Sensor Networks. UCLA Computer Science Department, Tech. Rep. UCLA/CSD-TR-01-0023 (May 2001)

    Google Scholar 

  5. Ganesan, D., Govindan, R., Shenker, S., Estrin, D.: Highly-resilient,energy-efficient multipath routing in wireless sensor networks. Mobile Computing and Communications Review (MC2R) 1(2) (2002)

    Google Scholar 

  6. Deng, J., Han, R., Mishra, S.: INSENS: intrusion-tolerant routing in wireless sensor networks. Technical Report CUCS-939-02, Department of Computer Science, University of Colorado (2002)

    Google Scholar 

  7. Ye, F., et al.: Statistical En-Route Filtering of Injected False Datasensor Networks. In: Proc. IEEE INFOCOM, Hong Kong (2004)

    Google Scholar 

  8. Zhu, S., et al.: An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks. In: Proc. IEEE Symp. Security and Privacy, Oakland, CA, pp. 259–271 (May 2004)

    Google Scholar 

  9. Zhu, et al.: An effective secure routing for false data injection attack in wireless sensor network. In: Proceedings of the Asia-Pacific Network Operations and Management Symposium, pp. 457–465 (2007)

    Google Scholar 

  10. Stuber, G.L.: Principles of Mobile Communication, 2nd edn. Kluwer Academic, Boston (2001)

    Google Scholar 

  11. Lazos, L., et al.: ROPE: Robust position estimation in wireless sensor network. In: IPSN 2005. Proc. Int. Symp. Inform. Process. Sensor Networks, pp. 324–331. IEEE, CA (2005)

    Google Scholar 

  12. Anderson, R., Chan, H., Perrig, A.: Key infection: Smart trust for smart dust. In: ICNP 2004. Proc. IEEE Int. Conf. Network Protocols, pp. 206–215. IEEE Comput. Soc., CA (2004)

    Google Scholar 

  13. Wang, G., et al.: On supporting Distributed Collaboration Sensor Networks. In: Proc. MILCOM (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Hongke Zhang Stephan Olariu Jiannong Cao David B. Johnson

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zhu, Z., Tan, Q., Zhu, P. (2007). A Stream-Data Oriented Secure Routing Protocol in Wireless Sensor Networks. In: Zhang, H., Olariu, S., Cao, J., Johnson, D.B. (eds) Mobile Ad-Hoc and Sensor Networks. MSN 2007. Lecture Notes in Computer Science, vol 4864. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77024-4_76

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-77024-4_76

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-77023-7

  • Online ISBN: 978-3-540-77024-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics