Abstract
In Wireless Sensor Network (WSN) sensors are densely deployed where the intruders can compromise some sensor nodes and inject false data in order to raise false alarms, reduce network lifetime, utilize bandwidth resources and so on. False Data Injection can possibly occur in Data Aggregation (DA) and Data Forwarding (DF). This paper analyses EFDD Protocol-Early False Data Detection Protocol which addresses the two possibilities in a simple and secure way considering the constraints of sensor nodes. The main idea is the selection of the network structure; this protocol will work effectively in Spatial/Semantic Correlation Tree Structure (SCT). False Data Detection in DA is done using some monitoring nodes which will monitor the Data Aggregator. EFDD in SCT structure reduce the counterfeit data transmission when compared to other structure in a better way. The result shows that EFDD reduce data transmission by dropping false data earlier and it also reduces computation when compared to the existing schemes.
Similar content being viewed by others
References
Bojkovic Z.S., Bakmaz B.M., Bakmaz M.R. (2008) Security issues in wireless sensor network. Intenational Journal of Commnications 2(1): 106–115
Krishnamachari, B., Estrin, D., & Wicker, S. (2002). Impact on Data Aggregation in wireless sensor network. Distributed Computing Systems Workshops. (DEBS), Vienna, Austria.
Zhu Y., Vedantham R., Park S.-J., Sivakumar R. (2008) A scalable correlation aware aggregation strategy for wireless sensor networks. Journal Information fusion archive 9(3): 354–369
Ye F., Luo H., Lu S., Zhang L. (2005) Statistical en-route detection and filtering of injected false data in sensor networks. IEEE Journal of Selected Areas in Communications 23(4): 839–850
Yu, Z., & Guan, Y. (2006). A dynamic en-route scheme for filtering false data in wireless sensor networks. In Proceedings of the IEEE INFOCOM, pp. 1–12, Barcelona, Spain, April 23–27.
Hu, L., Evans, D. (2003). Secure aggregation for wireless networks. In Proceedings of the workshop security assurance Ad hoc networks, pp. 384–394, Orlando, FL, January 28.
Du, W., Deng, J., Han, Y. S., & Varshney, P. K. (2003). A witness-based approach for data fusion assurance in wireless sensor networks. In Proceedings of the IEEE GLOBECOM, pp. 1435–1439.
Przydatek, B., Song, D., & Perrig, A. (2003). SIA: Secure information aggregation in sensor networks. In Proceedings of the SenSystems, pp. 255–265.
Çam H., Ozdemir S., Nair P., Muthuavinashiappan D., Sanli H. O. (2006) Energy-efficient and secure pattern based data aggregation for wireless sensor networks. Computer Communications 29(4): 446–455
Shu J., Chen Y., Liu L., Zhang S., Li J. (2010) Study on aggregation tree construction based on GRID. Journal of Computers 5(6): 852–860
Rivest, R. L. (1994). The RC5 encryption algorithm. In Proceedings of the 2nd international workshop FSE, pp. 86–96.
Manoj, R., & Dhinakaran, N. Survey of key predistribution schemes for key management in wireless sensor networks. ICNVS’10 Proceedings of the 12th international conference on Networking, VLSI and Signal Processing, 135–140.
Ozdemir S., Çam H. (2010) Integration of false data detection with data aggregation and confidential transmission in wireless sensor networks. IEEE/ACM Transactions on Networking 18(3): 736–749
Ding M., Cheng X., Xue G. (2003) Aggregation tree construction in sensor network. IEEE 58th Vehicular Technology Conference 4: 2168–2172
Preda R.O., Vizireanu D.N. (2011) A robust wavelet based video watermarking scheme for copyright protection using the human visual system. Journal of Electronic Imaging 20: 013022
Sandhya M. K., Murugan K. (2011) Secure data aggregation in wireless sensor networks using privacy homomorphism. Journal of Advances in Networks and Communications 132(2): 482–490
Preda R. O., Vizireanu D. N. (2011) Quantization based video watermarking in the wavelet domain with spatial and temporal redundancy. International Journal of Electronics 98(03): 393–405
Preda R. O., Vizireanu D. N. (2010) A robust digital watermarking scheme for video copyright protection in the wavelet domain. Measurement 43(10): 1720–1726
Lee H. Y., Cho T. H., Kim H.-J. (2010) Fuzzy-based detection of injected false data in wireless sensor networks. Journal of Information Security and Assurance 76: 128–137
Tan H. O., Korpeoglu I., Stojmenovic I. (2011) Computing localized power—efficient data aggregation trees for sensor networks. Journal of Parallel and Distributed Systems–IEEE 22(3): 489–500
Zhu Y., Vedantham R., Park S.-J., Sivakumar R. (2008) A scalable correlation aware aggregation strategy for wireless sensor networks. ACM Journal of Information Fusion 9(3): 354–369
Zhu, S., Setia, S., Jajodia, S., & Ning, P. (2007). Interleaved hop-by-hop authentication against false data injection attacks in sensor networks. Journal ACM Transactions on Sensor Networks, 3(3), Article no: 14.
Dsoul, M., Al-Khasawneh, A., Abdallah, A. E., & Obeidat, I. (2012). An energy threhold-based clustering protocol for wireless sensor networks. Journal of Wireless personal Communications, pp. 1–14.
Gao T., Jin R. C., Song J. y., Xu T. B., Wang L. D. (2012) Energy-efficient cluster head selection scheme based on multiple criteria decision making for wireless sensor networks. Journal of Wireless personal Communications 63(4): 871–894
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Manoj Kumar, S., Rajkumar, N. & Catherine Christinal Mary, W. Dropping False Packet to Increase the Network Lifetime of Wireless Sensor Network using EFDD Protocol. Wireless Pers Commun 70, 1697–1709 (2013). https://doi.org/10.1007/s11277-012-0775-3
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-012-0775-3