Skip to main content

A Method for the Enhancement of the Detection Power and Energy Savings against False Data Injection Attacks in Wireless Sensor Networks

  • Conference paper
Intelligent Computing Technology (ICIC 2012)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 7389))

Included in the following conference series:

  • 2556 Accesses

Abstract

Malicious attackers spread various attacks to destroy the system of the sensor network. False report injection attacks occur on the application layer and drain the energy resources of each node. Statistical en-route filtering (SEF) is proposed to detect and drop false reports in intermediate nodes during the forwarding process. In this work, we propose a security method to improve the detection power and energy savings using four types of keys. The performance of the proposed method was evaluated and compared to that of SEF against the attack. Our experimental results reveal that our method improves detection power and energy savings by up to 25% and 9%, respectively.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A Survey on Sensor Networks. IEEE Communications Magazine 40, 102–114 (2002)

    Article  Google Scholar 

  2. Chan, H., Perrig, A.: Security and Privacy in Sensor Networks. Computer 36, 103–105 (2003)

    Article  Google Scholar 

  3. Przydatek, B.D., Song, A.P.: SIA: Secure Information Aggregation in Sensor Networks. In: Proc. of CCNC, vol. 23, pp. 63–98 (2004)

    Google Scholar 

  4. Ye, F., Luo, H., Lu, S., Zhang, L.: Statistical En-route Filtering of Injected False Data in Sensor Networks. IEEE Journal on Selected Areas in Communications 23, 839–850 (2005)

    Article  Google Scholar 

  5. Sun, C.I., Lee, H.Y., Cho, T.H.: A Path Selection Method for Improving the Detection Power of Statistical Filtering in Sensor Networks. J. Inf. Sci. Eng. 25, 1163–1175 (2009)

    MathSciNet  Google Scholar 

  6. Zhu, S., Setia, S., Jajodia, S.: LEAP: Efficient Security Mechanisms for Large-scale Distributed Sensor Networks. In: Proceedings of the 10th ACM Conference on Computer and Communications Security, pp. 62–72. ACM (2003)

    Google Scholar 

  7. Crossbow technology Inc., http://www.xbow.com

  8. Intanagonwiwat, C., Govindan, R., Estrin, D.: Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks. In: MOBICOM, pp. 56–67. ACM (2000)

    Google Scholar 

  9. Ye, F., Chen, A., Lu, S., Zhang, L.: A Scalable Solution to Minimum Cost Forwarding in Large Sensor Networks. In: Proceedings of the Tenth International Conference on Computer Communications and Networks, pp. 304–309 (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Nam, S.M., Cho, T.H. (2012). A Method for the Enhancement of the Detection Power and Energy Savings against False Data Injection Attacks in Wireless Sensor Networks. In: Huang, DS., Jiang, C., Bevilacqua, V., Figueroa, J.C. (eds) Intelligent Computing Technology. ICIC 2012. Lecture Notes in Computer Science, vol 7389. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31588-6_70

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-31588-6_70

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-31587-9

  • Online ISBN: 978-3-642-31588-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics