Skip to main content

Advertisement

Log in

The design and evaluation of interleaved authentication for filtering false reports in multipath routing WSNs

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

In this paper, we consider filtering false reports in braided multipath routing sensor networks. While multipath routing provides better resilience to various faults in sensor networks, it has two problems regarding the authentication design. One is that, due to the large number of partially overlapped routing paths between the source and sink nodes, the authentication overhead could be very high if these paths are authenticated individually; the other is that false reports may escape the authentication check through the newly identified node association attack. In this paper, we propose enhancements to solve both problems such that secure and efficient authentication can be achieved in multipath routing. The proposed scheme is (t + 1)-resilient, i.e. it is secure with up to t compromised nodes. The upper bound that a false report may be forwarded in the network is O(t 2).

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16

Similar content being viewed by others

References

  1. Karlof, C., & Wagner, D. (2003). Secure routing in wireless sensor networks: Attacks and countermeasures. In IEEE International workshop on Sensor Network Protocols and Applications (pp. 113–127).

  2. Ye, F., Luo, H., Lu, S., & Zhang, L. (2004). Statistical en-route detection and filtering of injected false data in sensor networks. In IEEE INFOCOM 2004.

  3. Zhu, S., Setia, S., Jajodia, S., & Ning, P. (2004). An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks. In Proceedings of IEEE Symposium on Security and Privacy, Oakland, CA, USA.

  4. Yang, H., Ye, F., Yuan, Y., Lu, S., & Arbaugh, W. (2005). Toward resilient security in wireless sensor networks. In ACM MOBIHOC’05.

  5. Zhang, W., & Cao, G. (2005). Group rekeying for filtering false data in sensor networks: A predistribution and local collaboration-based approach. In INFOCOM.

  6. Ganesan, D., Govindan, R., Shenker, S., & Estrin, D. (2001). Highly-resilient, energy-efficient multipath routing in wireless sensor networks. ACM SIGMOBILE Mobile Computing and Communications Review, 5(4), 10–24.

    Google Scholar 

  7. Al-Karaki, J. N., & Kamal, A. E. Routing techniques in wireless sensor networks: A survey. IEEE Wireless Communications, 11(6), 6–28.

  8. Intanagonwiwat, C., Govindan, R., & Estrin, D. (1999). Directed diffusion: a scalable and robust communication in wireless sensor networks. In 5th IEEE/ACM Mobicom (pp. 174–185).

  9. Xu, Y., Heidemann, J., & Estrin, D. (2001). Geography-informed energy conservation for ad hoc routing. In ACM MOBICOM.

  10. Dulman, S., Nieberg, T., Wu, J., & Havinga, P. (2003). Trade-off between traffic overhead and reliability in multipath routing for wireless sensor networks. In WCNC workshop.

  11. Ye, F., Zhong, G., Lu, S., & Zhang, L. (2005). GRAdient broadcast: A robust data delivery protocol for large scale sensor networks. ACM Wireless Network (WINET), 11(2), 285–298.

    Google Scholar 

  12. Heinzelman, W. R., Chandrakasan, A., & Balakrishnan, H. (2002). An application-specific protocol architecture for wireless microsensor networks. IEEE Transactions on Wireless Communications, 1(4), 660–670.

    Article  Google Scholar 

  13. Kawadia, V., & Kumar, P. R. (2003). Power control and clustering in ad hoc networks. In INFOCOM.

  14. Ren, K., Lou, W., & Zhang, Y. (2006). LEDS: Providing location-aware end-to-end data security in wireless sensor networks. In INFOCOM.

  15. Hankerson, D., Menezes, A., Vanstone, S. (2004). Guide to elliptic curve cryptography. New York: Springer Verlag.

    MATH  Google Scholar 

  16. Ning, P., & Liu, A., TinyECC: Elliptic curve cryptography for sensor networks. Retrieved from http://discovery.csc.ncsu.edu/software/TinyECC/.

Download references

Acknowledgments

This work was supported partially by NSF CAREER grant CCF 0641177 and NSF grants CCF 0430021, CNS 0720595.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Youtao Zhang.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Zhang, Y., Yang, J., Vu, H.T. et al. The design and evaluation of interleaved authentication for filtering false reports in multipath routing WSNs. Wireless Netw 16, 125–140 (2010). https://doi.org/10.1007/s11276-008-0119-0

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-008-0119-0

Keywords