Abstract
Wireless sensor networks are vulnerable to false data injection attacks in which an adversary injects fabricated reports into the network with the goal of deceiving the base station or of draining the energy resources. Several security solutions against the attacks have been proposed by researchers. Most of them, however, make nodes to involve additional computation and communication overhead in the report generation and forwarding processes, which may result in extra energy consumption. This paper presents a false data detection method that exploits a fuzzy rule-based system to verify the authenticity of sensing reports in sensor networks. Three parameters computed based on the collected reports in the base station are used for the verification. Compared to the existing crisp-based detection solutions, the method can reduce errors in the detection, thanks to approximate reasoning provided by fuzzy logic. Compared to the en-route filtering solutions, extra energy can be also conserved since it involves neither complex report generation nor en-route verification.
This work was supported by National Research Foundation of Korea Grant funded by the Korean Government(2009-0068361).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Buttyan, L., Dora, L., Vajda, I.: Statistical Wormhole Detection in Sensor Networks. In: Molva, R., Tsudik, G., Westhoff, D. (eds.) ESAS 2005. LNCS, vol. 3813, pp. 128–141. Springer, Heidelberg (2005)
Przydatek, B., Song, D., Perrig, A.: SIA: Secure Information Aggregation in Sensor Networks. In: Proc. SenSys, pp. 255–265 (2003)
Ye, F., Luo, H., Lu, S.: Statistical En-Route Filtering of Injected False Data in Sensor Networks. IEEE J. Sel. Area Comm. 23, 839–850 (2005)
Yang, H., Lu, S.: Commutative Cipher Based En-Route Filtering in Wireless Sensor Networks. In: Proc. VTC, pp. 1223–1227 (2004)
Zhu, S., Setia, S., Jajodia, S., Ning, P.: Interleaved Hop-by-Hop Authentication against False Data Injection Attacks in Sensor Networks. ACM Transactions on Sensor Networks 3 (2007)
Lee, H.Y., Cho, T.H.: Key Inheritance-Based False Data Filtering Scheme in Wireless Sensor Networks. In: Madria, S.K., Claypool, K.T., Kannan, R., Uppuluri, P., Gore, M.M. (eds.) ICDCIT 2006. LNCS, vol. 4317, pp. 116–127. Springer, Heidelberg (2006)
Lee, H.Y.: Adaptive Selection of Secure-Routing Protocols in Wireless Sensor Networks. Ph.D. Dissertation, Sungkyunkwan University (2008)
Lee, H.Y., Lee, S.J., Cho, T.H.: Detection of False Positive Attacks in Ubiquitous Sensor Networks. Journal of the Korea Society for Simulation 18, 83–90 (2009)
Lee, H.Y., Cho, T.H.: Fuzzy Adaptive Selection of Filtering Schemes for Energy Saving in Sensor Networks. IEICE Trans. Commun. E90-B, 3346–3353 (2007)
Yuan, T., Zhang, S., Zhong, Y., Ma, J.: KAEF: An En-Route Scheme of Filtering False Data in Wireless Sensor Networks. In: Proc. IPCCC (2008)
Yu, L., Li, J.: Grouping-Based Resilient Statistical En-Route Filtering for Sensor Networks. In: Proc. INFOCOM (2009)
Yu, C.M., Lu, C.S., Kuo, S.Y.: A DoS-Resilient En-Route Filtering Scheme for Sensor Networks. In: Proc. MobiHoc, pp. 343–344 (2009)
Marti, S., Giuli, T.K., Lai, K., Baker, M.: Mitigating Routing Misbehavior in Mobile Ad hoc Networks. In: Proc. MobiCom, pp. 255–265 (2000)
Crossbow Technology, http://www.xbow.com/
Silva, A.P.R., Martins, M.H.T., Rocha, B.P.S., Loureiro, A.A.F., Ruiz, L.B., Wong, H.C.: Decentralized Intrusion Detection in Wireless Sensor Networks. In: Proc. Q2SWinet, pp. 16–23 (2005)
Mitrokotsa, A., Karygiannis, A.: Intrusion Detection Techniques in Sensor Networks. In: Wireless Sensor Network Security. IOS Press, Amsterdam (2008)
Serrano, N., Seraji, H.: Landing Site Selection using Fuzzy Rule-Based Reasoning. In: Proc. ICRA, pp. 4899–4904 (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lee, H.Y., Cho, T.H., Kim, HJ. (2010). Fuzzy-Based Detection of Injected False Data in Wireless Sensor Networks. In: Bandyopadhyay, S.K., Adi, W., Kim, Th., Xiao, Y. (eds) Information Security and Assurance. ISA 2010. Communications in Computer and Information Science, vol 76. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13365-7_13
Download citation
DOI: https://doi.org/10.1007/978-3-642-13365-7_13
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-13364-0
Online ISBN: 978-3-642-13365-7
eBook Packages: Computer ScienceComputer Science (R0)