Abstract
In this paper, we consider filtering false reports in braided multipath routing sensor networks. While multipath routing provides better resilience to various faults in sensor networks, it has two problems regarding the authentication design. One is that, due to the large number of partially overlapped routing paths between the source and sink nodes, the authentication overhead could be very high if these paths are authenticated individually; the other is that false reports may escape the authentication check through the newly identified node association attack. In this paper, we propose enhancements to solve both problems such that secure and efficient authentication can be achieved in multipath routing. The proposed scheme is (t + 1)-resilient, i.e. it is secure with up to t compromised nodes. The upper bound that a false report may be forwarded in the network is O(t 2).
















Similar content being viewed by others
References
Karlof, C., & Wagner, D. (2003). Secure routing in wireless sensor networks: Attacks and countermeasures. In IEEE International workshop on Sensor Network Protocols and Applications (pp. 113–127).
Ye, F., Luo, H., Lu, S., & Zhang, L. (2004). Statistical en-route detection and filtering of injected false data in sensor networks. In IEEE INFOCOM 2004.
Zhu, S., Setia, S., Jajodia, S., & Ning, P. (2004). An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks. In Proceedings of IEEE Symposium on Security and Privacy, Oakland, CA, USA.
Yang, H., Ye, F., Yuan, Y., Lu, S., & Arbaugh, W. (2005). Toward resilient security in wireless sensor networks. In ACM MOBIHOC’05.
Zhang, W., & Cao, G. (2005). Group rekeying for filtering false data in sensor networks: A predistribution and local collaboration-based approach. In INFOCOM.
Ganesan, D., Govindan, R., Shenker, S., & Estrin, D. (2001). Highly-resilient, energy-efficient multipath routing in wireless sensor networks. ACM SIGMOBILE Mobile Computing and Communications Review, 5(4), 10–24.
Al-Karaki, J. N., & Kamal, A. E. Routing techniques in wireless sensor networks: A survey. IEEE Wireless Communications, 11(6), 6–28.
Intanagonwiwat, C., Govindan, R., & Estrin, D. (1999). Directed diffusion: a scalable and robust communication in wireless sensor networks. In 5th IEEE/ACM Mobicom (pp. 174–185).
Xu, Y., Heidemann, J., & Estrin, D. (2001). Geography-informed energy conservation for ad hoc routing. In ACM MOBICOM.
Dulman, S., Nieberg, T., Wu, J., & Havinga, P. (2003). Trade-off between traffic overhead and reliability in multipath routing for wireless sensor networks. In WCNC workshop.
Ye, F., Zhong, G., Lu, S., & Zhang, L. (2005). GRAdient broadcast: A robust data delivery protocol for large scale sensor networks. ACM Wireless Network (WINET), 11(2), 285–298.
Heinzelman, W. R., Chandrakasan, A., & Balakrishnan, H. (2002). An application-specific protocol architecture for wireless microsensor networks. IEEE Transactions on Wireless Communications, 1(4), 660–670.
Kawadia, V., & Kumar, P. R. (2003). Power control and clustering in ad hoc networks. In INFOCOM.
Ren, K., Lou, W., & Zhang, Y. (2006). LEDS: Providing location-aware end-to-end data security in wireless sensor networks. In INFOCOM.
Hankerson, D., Menezes, A., Vanstone, S. (2004). Guide to elliptic curve cryptography. New York: Springer Verlag.
Ning, P., & Liu, A., TinyECC: Elliptic curve cryptography for sensor networks. Retrieved from http://discovery.csc.ncsu.edu/software/TinyECC/.
Acknowledgments
This work was supported partially by NSF CAREER grant CCF 0641177 and NSF grants CCF 0430021, CNS 0720595.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Zhang, Y., Yang, J., Vu, H.T. et al. The design and evaluation of interleaved authentication for filtering false reports in multipath routing WSNs. Wireless Netw 16, 125–140 (2010). https://doi.org/10.1007/s11276-008-0119-0
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11276-008-0119-0