Skip to main content
Log in

En-Route Filtering Techniques in Wireless Sensor Networks: A Survey

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Majority of wireless sensor networks (WSNs) are deployed in unattended environments and thus sensor nodes can be compromised easily. A compromised sensor node can be used to send fake sensing reports to the sink. If undetected these reports can raise false alarms. To deal with the problem of fake report generation, a number of en-route filtering schemes have been proposed. Each of these schemes uses different cryptographic methods to check the authenticity of reports while they are being forwarded hop by hop toward base station. However, majority of these techniques can handle only limited compromised nodes or they either need node localization or statically configured routes for sending reports. Furthermore, majority of en-route filtering techniques are vulnerable to various denial of service attacks. Our main aims in this survey are: (a) to describe the major en-route filtering techniques, (b) to analyze these techniques on various parameters including security and (c) to outline main unresolved research challenges in en-route filtering in WSNs.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Akkaya, K., & Younis, M. (2005). A survey on routing protocols for wireless sensor networks. Ad Hoc Networks, 3(3), 325–349.

    Article  Google Scholar 

  2. Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). A survey on sensor networks. IEEE Communications Magazine, 40(8), 102–114.

    Article  Google Scholar 

  3. Chi, S. H., & Cho, T. H. (2006). Fuzzy logic based propagation limiting method for message routing in wireless sensor networks. In Computational science and its applications-ICCSA 2006 (pp. 58–67). Springer.

  4. He, S., Chen, J., Sun, Y., Yau, D. K., & Yip, N. K. (2010). On optimal information capture by energy-constrained mobile sensors. IEEE Transactions on Vehicular Technology, 59(5), 2472–2484.

    Article  Google Scholar 

  5. Szewczyk, R., Mainwaring, A., Polastre, J., Anderson, J., & Culler, D. (2004). An analysis of a large scale habitat monitoring application. In Proceedings of the 2nd international conference on Embedded networked sensor systems (pp. 214–226). ACM (2004)

  6. Chan, H., & Perrig, A. (2003). Security and privacy in sensor networks. Computer, 36(10), 103–105.

    Article  Google Scholar 

  7. Xing, K., & Cheng, X. (2010). From time domain to space domain: Detecting replica attacks in mobile ad hoc networks. In INFOCOM, 2010 proceedings IEEE (pp. 1–9). IEEE.

  8. Younan, Y., Philippaerts, P., Piessens, F., Joosen, W., Lachmund, S., & Walter, T. (2011). Filter-resistant code injection on arm. Journal in Computer Virology, 7(3), 173–188.

    Article  Google Scholar 

  9. Przydatek, B., Song, D., & Perrig, A. (2003). SIA: Secure information aggregation in sensor networks. In Proceedings of the 1st international conference on embedded networked sensor systems (pp. 255–265). ACM.

  10. Zhu, S., Setia, S., Jajodia, S., & Ning, P. (2004). An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks. In Proceedings of 2004 IEEE symposium on security and privacy, 2004 (pp. 259–271). IEEE.

  11. Yang, Q., Yang, J., Yu, W., Zhang, N., & Zhao, W. (2011). On a hierarchical false data injection attack on power system state estimation. In 2011 IEEE Global Telecommunications Conference (GLOBECOM 2011) (pp. 1–5). IEEE.

  12. Liu, Y., Ning, P., & Reiter, M. K. (2011). False data injection attacks against state estimation in electric power grids. ACM Transactions on Information and System Security (TISSEC), 14(1), 13.

    Article  Google Scholar 

  13. Cárdenas, A. A., Amin, S., Lin, Z. S., Huang, Y. L., Huang, C. Y., & Sastry, S. (2011). Attacks against process control systems: Risk assessment, detection, and response. In Proceedings of the 6th ACM symposium on information, computer and communications security (pp. 355–366). ACM.

  14. Carman, D. W., Kruus, P. S., & Matt, B. J. (2000). Constraints and approaches for distributed sensor network security (final). DARPA project report (cryptographic Technologies Group, Trusted Information System, NAI Labs) (Vol. 1, no. 1).

  15. Wood, A. D., & Stankovic, J. A. (2002). Denial of service in sensor networks. Computer, 35(10), 54–62.

    Article  Google Scholar 

  16. Karlof, C., & Wagner, D. (2003). Secure routing in wireless sensor networks: Attacks and countermeasures. Ad Hoc Networks, 1(2), 293–315.

    Article  Google Scholar 

  17. Perrig, A., Szewczyk, R., Tygar, J. D., Wen, V., & Culler, D. E. (2002). Spins: Security protocols for sensor networks. Wireless Networks, 8(5), 521–534.

    Article  MATH  Google Scholar 

  18. Shi, E., & Perrig, A. (2004). Designing secure sensor networks. IEEE Wireless Communications, 11(6), 38–43.

    Article  Google Scholar 

  19. Ye, F., Luo, H., Lu, S., & Zhang, L. (2005). Statistical en-route filtering of injected false data in sensor networks. IEEE Journal on Selected Areas in Communications, 23(4), 839–850.

    Article  Google Scholar 

  20. Sun, C. I., Lee, H. Y., & Cho, T. H. (2009). A path selection method for improving the detection power of statistical filtering in sensor networks. Journal of Information Science and Engineering, 25(4), 1163–1175.

    MathSciNet  Google Scholar 

  21. Sun, Q., & Wu, M. (2011). A double key-sharing based false data filtering scheme in wireless sensor networks. In 2011 IEEE 10th international conference on trust, security and privacy in computing and communications (TrustCom) (pp. 509–516). IEEE.

  22. Yang, H., Ye, F., Yuan, Y., Lu, S., & Arbaugh, W. (2005). Toward resilient security in wireless sensor networks. In Proceedings of the 6th ACM international symposium on mobile ad hoc networking and computing (pp. 34–45). ACM.

  23. Yu, L., & Li, J. (2009). Grouping-based resilient statistical en-route filtering for sensor networks. In INFOCOM 2009, IEEE (pp. 1782–1790). IEEE.

  24. Yang, H., & Lu, S. (2004). Commutative cipher based en-route filtering in wireless sensor networks. In 2004 IEEE 60th vehicular technology conference, 2004. VTC2004-fall (Vol. 2, pp. 1223–1227). IEEE.

  25. Zhang, Y., Liu, W., Lou, W., & Fang, Y. (2006). Location-based compromise-tolerant security mechanisms for wireless sensor networks. IEEE Journal on Selected Areas in Communications, 24(2), 247–260.

    Article  Google Scholar 

  26. Wang, H., & Li, Q. (2010). Achieving robust message authentication in sensor networks: A public-key based approach. Wireless Networks, 16(4), 999–1009.

    Article  MathSciNet  Google Scholar 

  27. Hankerson, D., Menezes, A. J., & Vanstone, S. (2006). Guide to elliptic curve cryptography. New York: Springer.

    MATH  Google Scholar 

  28. Shamir, A. (1979). How to share a secret. Communications of the ACM, 22(11), 612–613.

    Article  MathSciNet  MATH  Google Scholar 

  29. Zargar, S. T., Joshi, J., & Tipper, D. (2013). A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks. IEEE Communications Surveys and Tutorials, 15(4), 2046–2069.

    Article  Google Scholar 

  30. Yu, B., & Xiao, B. (2006). Detecting selective forwarding attacks in wireless sensor networks. In 20th international parallel and distributed processing symposium, 2006. IPDPS 2006 (p. 8). IEEE.

  31. Bauer, K., McCoy, D., Grunwald, D., Kohno, T., & Sicker, D. (2007). Low-resource routing attacks against tor. In Proceedings of the 2007 ACM workshop on privacy in electronic society (pp. 11–20). ACM.

  32. Camtepe, S. A., & Yener, B. (2005). Key distribution mechanisms for wireless sensor networks: A survey. Rensselaer Polytechnic Institute, Troy, New York, Technical Report (pp. 05–07).

  33. Wang, Y., Attebury, G., & Ramamurthy, B. (2006). A survey of security issues in wireless sensor networks. IEEE Communications Surveys and Tutorials, 8(2), 2–23.

    Article  Google Scholar 

  34. Xiao, Y., Rayi, V. K., Sun, B., Du, X., Hu, F., & Galloway, M. (2007). A survey of key management schemes in wireless sensor networks. Computer Communications, 30(11), 2314–2341.

    Article  Google Scholar 

  35. Chen, X., Makki, K., Yen, K., & Pissinou, N. (2009). Sensor network security: A survey. IEEE Communications Surveys and Tutorials, 11(2), 52–73.

    Article  Google Scholar 

  36. Hussain, M. A., Khan, P., & Sup, K. K. (2009). WSN research activities for military application. In Proceedings of the 11th international conference on advanced communication technology (Vol. 1, pp. 271–274). IEEE Press.

  37. Wenjie, C., Lifeng, C., Zhanglong, C., & Shiliang, T.: A realtime dynamic traffic control system based on wireless sensor network. In International conference workshops on parallel processing, 2005. ICPP 2005 workshops (pp. 258–264). IEEE.

  38. Son, B., Her, Y. S., & Kim, J. G. (2006). A design and implementation of forest-fires surveillance system based on wireless sensor networks for South Korea mountains. International Journal of Computer Science and Network Security (IJCSNS), 6(9), 124–130.

    Google Scholar 

  39. Alemdar, H., & Ersoy, C. (2010). Wireless sensor networks for healthcare: A survey. Computer Networks, 54(15), 2688–2710.

    Article  Google Scholar 

  40. Akhondi, M. R., Talevski, A., Carlsen, S., & Petersen, S. (2010). Applications of wireless sensor networks in the oil, gas and resources industries. In 2010 24th IEEE international conference on advanced information networking and applications (AINA) (pp. 941–948). IEEE.

  41. Potyrailo, R. A., Nagraj, N., Surman, C., Boudries, H., Lai, H., Slocik, J. M., et al. (2012). Wireless sensors and sensor networks for homeland security applications. TrAC Trends in Analytical Chemistry, 40, 133–145.

    Article  Google Scholar 

  42. Vogt, H. (2004). Exploring message authentication in sensor networks. In C. Castelluccia, H. Hartenstein, C. Paar, & D. Westhoff (Eds.), Security in ad-hoc and sensor networks (pp. 19–30). Berlin, Heidelberg: Springer.

    Google Scholar 

  43. Xin-Sheng, W., Yong-Zhao, Z., Shu-Ming, X., & Liang-Min, W. (2009). Lightweight defense scheme against selective forwarding attacks in wireless sensor networks. In International conference on cyber-enabled distributed computing and knowledge discovery, 2009. CyberC’09 (pp. 226–232). IEEE.

  44. Kaplantzis, S., Shilton, A., Mani, N., & Şekercioğlu, Y. A. (2007). Detecting selective forwarding attacks in wireless sensor networks using support vector machines. In 3rd international conference on intelligent sensors, sensor networks and information, 2007. ISSNIP 2007 (pp. 335–340). IEEE.

  45. Hu, Y. C., Perrig, A., & Johnson, D. B. (2003). Packet leashes: A defense against wormhole attacks in wireless networks. In INFOCOM 2003. Twenty-second annual joint conference of the IEEE computer and communications. IEEE societies (Vol. 3, pp. 1976–1986). IEEE.

  46. Newsome, J., Shi, E., Song, D., & Perrig, A. (2004). The sybil attack in sensor networks: analysis and defenses. In Proceedings of the 3rd international symposium on Information processing in sensor networks (pp. 259–268). ACM.

  47. Hamid, M. A., Mamun-Or-Rashid, M., & Hong, C. S. (2006). Routing security in sensor network: HELLO flood attack and defense (pp. 77–81). Dhaka, Bangaladesh: Proceedings of IEEE ICNEWS.

    Google Scholar 

  48. Hu, Y., Lin, Y., Liu, Y., & Zeng, W. (2007). RAS: A robust authentication scheme for filtering false data in wireless sensor networks. In 15th IEEE international conference on networks, 2007. ICON 2007. (pp. 200–205). IEEE.

  49. Bloom, B. H. (1970). Space/time trade-offs in hash coding with allowable errors. Communications of the ACM, 13(7), 422–426.

    Article  MATH  Google Scholar 

  50. Choi, H. M., Nam, S. M., Cho, T. H., et al. (2013). A secure routing method for detecting false reports and wormhole attacks in wireless sensor networks. Wireless Sensor Network, 5(03), 33.

    Article  Google Scholar 

  51. Liu, Z., Wang, J., Zhang, S., Liu, H., & Zhang, X. (2014). A cluster-based false data filtering scheme in wireless sensor networks. Adhoc and Sensor Wireless Networks, 23(01), 21–45.

    Google Scholar 

  52. Royer, E. M., & Toh, C. K. (1999). A review of current routing protocols for ad hoc mobile wireless networks. IEEE Personal Communications, 6(2), 46–55.

    Article  Google Scholar 

  53. Tsudik, G. (1992). Message authentication with one-way hash functions. ACM SIGCOMM Computer Communication Review, 22(5), 29–38.

    Article  Google Scholar 

  54. Ren, K., Lou, W., & Zhang, Y. (2008). Leds: Providing location-aware end-to-end data security in wireless sensor networks. IEEE Transactions on Mobile Computing, 7(5), 585–598.

    Article  Google Scholar 

  55. Fakhrey, H., Tiwari, R., Johnston, M., & Al-Mathehaji, Y. A. (2016). The optimum design of location-dependent key management protocol for a WSN with a random selected cell reporter. IEEE Sensors Journal, 16(19), 7217–7226.

    Article  Google Scholar 

  56. Wang, J., Liu, Z., Zhang, S., & Zhang, X. (2014). Defending collaborative false data injection attacks in wireless sensor networks. Information Sciences, 254, 39–53.

    Article  MathSciNet  Google Scholar 

  57. Rabaey, C. S. J., & Langendoen, K. (2002). Robust positioning algorithms for distributed ad-hoc wireless sensor networks. In USENIX technical annual conference (pp. 317–327).

  58. Patwari, N., Hero, A. O, I. I. I., Perkins, M., Correal, N. S., & O’dea, R. J. (2003). Relative location estimation in wireless sensor networks. IEEE Transactions on Signal Processing, 51(8), 2137–2148.

    Article  Google Scholar 

  59. Nam, S. M., & Cho, T. H. (2016). Context-aware architecture for probabilistic voting-based filtering scheme in sensor networks. IEEE Transactions on Mobile Computing. doi:10.1109/TMC.2016.2641219.

    Google Scholar 

  60. Li, F., & Wu, J. (2006). A probabilistic voting-based filtering scheme in wireless sensor networks. In Proceedings of the 2006 international conference on Wireless communications and mobile computing (pp. 27–32). ACM.

  61. Yu, Z., & Guan, Y. (2010). A dynamic en-route filtering scheme for data reporting in wireless sensor networks. IEEE/ACM Transactions on Networking, 18(1), 150–163.

    Article  MathSciNet  Google Scholar 

  62. Yuan, T., Zhang, S., Zhong, Y., & Ma, J. (2008). KAEF: An en-route scheme of filtering false data in wireless sensor networks. In IEEE International performance, computing and communications conference, 2008. IPCCC 2008 (pp. 193–200). IEEE.

  63. Lamport, L. (1981). Password authentication with insecure communication. Communications of the ACM, 24(11), 770–772.

    Article  MathSciNet  Google Scholar 

  64. Zhu, S., Setia, S., & Jajodia, S. (2006). Leap+: Efficient security mechanisms for large-scale distributed sensor networks. ACM Transactions on Sensor Networks (TOSN), 2(4), 500–528.

    Article  Google Scholar 

  65. Yang, X., Lin, J., Yu, W., Moulema, P. M., Fu, X., & Zhao, W. (2015). A novel en-route filtering scheme against false data injection attacks in cyber-physical networked systems. IEEE Transactions on Computers, 64(1), 4–18.

    Article  MathSciNet  MATH  Google Scholar 

  66. Kraub, C., Schneider, M., Bayarou, K., & Eckert, C. (2007). STEF: A secure ticket-based en-route filtering scheme for wireless sensor networks. In: The second international conference on Availability, reliability and security, 2007. ARES 2007 (pp. 310–317). IEEE.

  67. Ma, J., Zhang, S., Zhong, Y., & Tong, X. (2006). SeLoc: Secure localization for wireless sensor and actor network. In 2006 IEEE international conference on mobile adhoc and sensor systems (MASS) (pp. 864–869). IEEE.

  68. Sastry, N., Shankar, U., & Wagner, D. (2003). Secure verification of location claims. In Proceedings of the 2nd ACM workshop on wireless security (pp. 1–10). ACM.

  69. Chan, H., Luk, M., & Perrig, A. (2005). Using clustering information for sensor network localization. In V. K. Prasanna, S. S. Iyengar, P. G. Spirakis, & M. Welsh (Eds.), Distributed computing in sensor systems (pp. 109–125). Berlin, Heidelberg: Springer.

    Chapter  Google Scholar 

  70. Eschenauer, L., & Gligor, V. D. (2002). A key-management scheme for distributed sensor networks. In Proceedings of the 9th ACM conference on computer and communications security (pp. 41–47). ACM.

  71. Chan, H., Perrig, A., & Song, D. (2003). Random key predistribution schemes for sensor networks. In Proceedings of 2003 symposium on security and privacy, 2003 (pp. 197–213). IEEE.

  72. Liu, D., Ning, P., & Li, R. (2005). Establishing pairwise keys in distributed sensor networks. ACM Transactions on Information and System Security (TISSEC), 8(1), 41–77.

    Article  Google Scholar 

  73. Luk, M., Perrig, A., & Whillock, B. (2006). Seven cardinal properties of sensor network broadcast authentication. In Proceedings of the fourth ACM workshop on security of ad hoc and sensor networks (pp. 147–156). ACM.

  74. Chen, Y. S., & Lei, C. L. (2010). Filtering false messages en-route in wireless multi-hop networks. In 2010 IEEE wireless communications and networking conference (WCNC) (pp. 1–6). IEEE.

  75. Dharmapurikar, S., Krishnamurthy, P., Sproull, T., & Lockwood, J. (2003). Deep packet inspection using parallel bloom filters. In Proceedings of 11th symposium on high performance interconnects, 2003 (pp. 44–51). IEEE.

  76. Lu, R., Lin, X., Zhu, H., Liang, X., & Shen, X. (2012). Becan: A bandwidth-efficient cooperative authentication scheme for filtering injected false data in wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 23(1), 32–43.

    Article  Google Scholar 

  77. Liu, A., & Ning, P. (2008). TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks. In International conference on information processing in sensor networks, 2008. IPSN’08 (pp. 245–256). IEEE.

  78. Wang, H., Sheng, B., Tan, C. C., & Li, Q. (2008). Comparing symmetric-key and public-key based security schemes in sensor networks: A case study of user access control. In The 28th international conference on distributed computing systems, 2008. ICDCS’08 (pp. 11–18). IEEE.

  79. Yu, H., & He, J. (2013). Authentication and en-route data filtering for wireless sensor networks in the internet of things scenario. International Journal of Grid and Distributed Computing, 6(1), 1–12.

    Google Scholar 

  80. Shahzad, M. K., & Cho, T. H. (2017). An energy-aware routing and filtering node (ERF) selection in CCEF to extend network lifetime in WSN. IETE Journal of Research. doi:10.1080/03772063.2016.1241721.

    Google Scholar 

  81. Čapkun, S., & Hubaux, J. P. (2005). Secure positioning of wireless devices with application to sensor networks. In Proceedings of IEEE INFOCOM 2005. 24th annual joint conference of the IEEE computer and communications societies (Vol. 3, pp. 1917–1928). IEEE.

  82. Lazos, L., & Poovendran, R. (2004). SeRLoc: Secure range-independent localization for wireless sensor networks. In Proceedings of the 3rd ACM workshop on wireless security (pp. 21–30). ACM.

  83. Lazos, L., Poovendran, R., & Čapkun, S. (2005). Rope: Robust position estimation in wireless sensor networks. In Proceedings of the 4th international symposium on Information processing in sensor networks (p. 43). IEEE Press.

  84. Karp, B., & Kung, H. T. (2000). GPSR: Greedy perimeter stateless routing for wireless networks. In Proceedings of the 6th annual international conference on Mobile computing and networking (pp. 243–254). ACM.

  85. Yu, Y., Govindan, R., & Estrin, D. (2001). Geographical and energy aware routing: A recursive data dissemination protocol for wireless sensor networks.

  86. Marti, S., Giuli, T. J., Lai, K., & Baker, M. (2000). Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of the 6th annual international conference on mobile computing and networking (pp. 255–265). ACM.

  87. Qadir, J., & Hasan, O. (2015). Applying formal methods to networking: Theory, techniques, and applications. IEEE Communications Surveys and Tutorials, 17(1), 256–291.

    Article  Google Scholar 

  88. De Moura, L., & Bjørner, N. (2008) Z3: An efficient SMT solver. In International conference on tools and algorithms for the construction and analysis of systems (pp. 337–340). Springer.

  89. Nipkow, T., Paulson, L. C., & Wenzel, M. (2002). Isabelle/HOL: A proof assistant for higher-order logic (Vol. 2283). New York: Springer.

    MATH  Google Scholar 

  90. Holzmann, G. (2003). Spin model checker, the: Primer and reference manual. Boston: Addison-Wesley.

    Google Scholar 

  91. Xie, G. G., Zhan, J., Maltz, D. A., Zhang, H., Greenberg, A., Hjalmtysson, G., & Rexford, J.: On static reachability analysis of ip networks. In Proceedings of IEEE INFOCOM 2005. 24th annual joint conference of the IEEE computer and communications societies (Vol. 3, pp. 2170–2183). IEEE.

  92. Narain, S., et al. (2005). Network configuration management via model finding. LISA, 5, 15–15.

    Google Scholar 

  93. Singh, V. P., Jain, S., Singhai, J. (2010). Hello flood attack and its countermeasures in wireless sensor networks. IJCSI International Journal of Computer Science Issues, 7(11), 23–27.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Alok Kumar.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kumar, A., Pais, A.R. En-Route Filtering Techniques in Wireless Sensor Networks: A Survey. Wireless Pers Commun 96, 697–739 (2017). https://doi.org/10.1007/s11277-017-4197-0

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-017-4197-0

Keywords

Navigation