Abstract
Majority of wireless sensor networks (WSNs) are deployed in unattended environments and thus sensor nodes can be compromised easily. A compromised sensor node can be used to send fake sensing reports to the sink. If undetected these reports can raise false alarms. To deal with the problem of fake report generation, a number of en-route filtering schemes have been proposed. Each of these schemes uses different cryptographic methods to check the authenticity of reports while they are being forwarded hop by hop toward base station. However, majority of these techniques can handle only limited compromised nodes or they either need node localization or statically configured routes for sending reports. Furthermore, majority of en-route filtering techniques are vulnerable to various denial of service attacks. Our main aims in this survey are: (a) to describe the major en-route filtering techniques, (b) to analyze these techniques on various parameters including security and (c) to outline main unresolved research challenges in en-route filtering in WSNs.
Similar content being viewed by others
References
Akkaya, K., & Younis, M. (2005). A survey on routing protocols for wireless sensor networks. Ad Hoc Networks, 3(3), 325–349.
Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). A survey on sensor networks. IEEE Communications Magazine, 40(8), 102–114.
Chi, S. H., & Cho, T. H. (2006). Fuzzy logic based propagation limiting method for message routing in wireless sensor networks. In Computational science and its applications-ICCSA 2006 (pp. 58–67). Springer.
He, S., Chen, J., Sun, Y., Yau, D. K., & Yip, N. K. (2010). On optimal information capture by energy-constrained mobile sensors. IEEE Transactions on Vehicular Technology, 59(5), 2472–2484.
Szewczyk, R., Mainwaring, A., Polastre, J., Anderson, J., & Culler, D. (2004). An analysis of a large scale habitat monitoring application. In Proceedings of the 2nd international conference on Embedded networked sensor systems (pp. 214–226). ACM (2004)
Chan, H., & Perrig, A. (2003). Security and privacy in sensor networks. Computer, 36(10), 103–105.
Xing, K., & Cheng, X. (2010). From time domain to space domain: Detecting replica attacks in mobile ad hoc networks. In INFOCOM, 2010 proceedings IEEE (pp. 1–9). IEEE.
Younan, Y., Philippaerts, P., Piessens, F., Joosen, W., Lachmund, S., & Walter, T. (2011). Filter-resistant code injection on arm. Journal in Computer Virology, 7(3), 173–188.
Przydatek, B., Song, D., & Perrig, A. (2003). SIA: Secure information aggregation in sensor networks. In Proceedings of the 1st international conference on embedded networked sensor systems (pp. 255–265). ACM.
Zhu, S., Setia, S., Jajodia, S., & Ning, P. (2004). An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks. In Proceedings of 2004 IEEE symposium on security and privacy, 2004 (pp. 259–271). IEEE.
Yang, Q., Yang, J., Yu, W., Zhang, N., & Zhao, W. (2011). On a hierarchical false data injection attack on power system state estimation. In 2011 IEEE Global Telecommunications Conference (GLOBECOM 2011) (pp. 1–5). IEEE.
Liu, Y., Ning, P., & Reiter, M. K. (2011). False data injection attacks against state estimation in electric power grids. ACM Transactions on Information and System Security (TISSEC), 14(1), 13.
Cárdenas, A. A., Amin, S., Lin, Z. S., Huang, Y. L., Huang, C. Y., & Sastry, S. (2011). Attacks against process control systems: Risk assessment, detection, and response. In Proceedings of the 6th ACM symposium on information, computer and communications security (pp. 355–366). ACM.
Carman, D. W., Kruus, P. S., & Matt, B. J. (2000). Constraints and approaches for distributed sensor network security (final). DARPA project report (cryptographic Technologies Group, Trusted Information System, NAI Labs) (Vol. 1, no. 1).
Wood, A. D., & Stankovic, J. A. (2002). Denial of service in sensor networks. Computer, 35(10), 54–62.
Karlof, C., & Wagner, D. (2003). Secure routing in wireless sensor networks: Attacks and countermeasures. Ad Hoc Networks, 1(2), 293–315.
Perrig, A., Szewczyk, R., Tygar, J. D., Wen, V., & Culler, D. E. (2002). Spins: Security protocols for sensor networks. Wireless Networks, 8(5), 521–534.
Shi, E., & Perrig, A. (2004). Designing secure sensor networks. IEEE Wireless Communications, 11(6), 38–43.
Ye, F., Luo, H., Lu, S., & Zhang, L. (2005). Statistical en-route filtering of injected false data in sensor networks. IEEE Journal on Selected Areas in Communications, 23(4), 839–850.
Sun, C. I., Lee, H. Y., & Cho, T. H. (2009). A path selection method for improving the detection power of statistical filtering in sensor networks. Journal of Information Science and Engineering, 25(4), 1163–1175.
Sun, Q., & Wu, M. (2011). A double key-sharing based false data filtering scheme in wireless sensor networks. In 2011 IEEE 10th international conference on trust, security and privacy in computing and communications (TrustCom) (pp. 509–516). IEEE.
Yang, H., Ye, F., Yuan, Y., Lu, S., & Arbaugh, W. (2005). Toward resilient security in wireless sensor networks. In Proceedings of the 6th ACM international symposium on mobile ad hoc networking and computing (pp. 34–45). ACM.
Yu, L., & Li, J. (2009). Grouping-based resilient statistical en-route filtering for sensor networks. In INFOCOM 2009, IEEE (pp. 1782–1790). IEEE.
Yang, H., & Lu, S. (2004). Commutative cipher based en-route filtering in wireless sensor networks. In 2004 IEEE 60th vehicular technology conference, 2004. VTC2004-fall (Vol. 2, pp. 1223–1227). IEEE.
Zhang, Y., Liu, W., Lou, W., & Fang, Y. (2006). Location-based compromise-tolerant security mechanisms for wireless sensor networks. IEEE Journal on Selected Areas in Communications, 24(2), 247–260.
Wang, H., & Li, Q. (2010). Achieving robust message authentication in sensor networks: A public-key based approach. Wireless Networks, 16(4), 999–1009.
Hankerson, D., Menezes, A. J., & Vanstone, S. (2006). Guide to elliptic curve cryptography. New York: Springer.
Shamir, A. (1979). How to share a secret. Communications of the ACM, 22(11), 612–613.
Zargar, S. T., Joshi, J., & Tipper, D. (2013). A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks. IEEE Communications Surveys and Tutorials, 15(4), 2046–2069.
Yu, B., & Xiao, B. (2006). Detecting selective forwarding attacks in wireless sensor networks. In 20th international parallel and distributed processing symposium, 2006. IPDPS 2006 (p. 8). IEEE.
Bauer, K., McCoy, D., Grunwald, D., Kohno, T., & Sicker, D. (2007). Low-resource routing attacks against tor. In Proceedings of the 2007 ACM workshop on privacy in electronic society (pp. 11–20). ACM.
Camtepe, S. A., & Yener, B. (2005). Key distribution mechanisms for wireless sensor networks: A survey. Rensselaer Polytechnic Institute, Troy, New York, Technical Report (pp. 05–07).
Wang, Y., Attebury, G., & Ramamurthy, B. (2006). A survey of security issues in wireless sensor networks. IEEE Communications Surveys and Tutorials, 8(2), 2–23.
Xiao, Y., Rayi, V. K., Sun, B., Du, X., Hu, F., & Galloway, M. (2007). A survey of key management schemes in wireless sensor networks. Computer Communications, 30(11), 2314–2341.
Chen, X., Makki, K., Yen, K., & Pissinou, N. (2009). Sensor network security: A survey. IEEE Communications Surveys and Tutorials, 11(2), 52–73.
Hussain, M. A., Khan, P., & Sup, K. K. (2009). WSN research activities for military application. In Proceedings of the 11th international conference on advanced communication technology (Vol. 1, pp. 271–274). IEEE Press.
Wenjie, C., Lifeng, C., Zhanglong, C., & Shiliang, T.: A realtime dynamic traffic control system based on wireless sensor network. In International conference workshops on parallel processing, 2005. ICPP 2005 workshops (pp. 258–264). IEEE.
Son, B., Her, Y. S., & Kim, J. G. (2006). A design and implementation of forest-fires surveillance system based on wireless sensor networks for South Korea mountains. International Journal of Computer Science and Network Security (IJCSNS), 6(9), 124–130.
Alemdar, H., & Ersoy, C. (2010). Wireless sensor networks for healthcare: A survey. Computer Networks, 54(15), 2688–2710.
Akhondi, M. R., Talevski, A., Carlsen, S., & Petersen, S. (2010). Applications of wireless sensor networks in the oil, gas and resources industries. In 2010 24th IEEE international conference on advanced information networking and applications (AINA) (pp. 941–948). IEEE.
Potyrailo, R. A., Nagraj, N., Surman, C., Boudries, H., Lai, H., Slocik, J. M., et al. (2012). Wireless sensors and sensor networks for homeland security applications. TrAC Trends in Analytical Chemistry, 40, 133–145.
Vogt, H. (2004). Exploring message authentication in sensor networks. In C. Castelluccia, H. Hartenstein, C. Paar, & D. Westhoff (Eds.), Security in ad-hoc and sensor networks (pp. 19–30). Berlin, Heidelberg: Springer.
Xin-Sheng, W., Yong-Zhao, Z., Shu-Ming, X., & Liang-Min, W. (2009). Lightweight defense scheme against selective forwarding attacks in wireless sensor networks. In International conference on cyber-enabled distributed computing and knowledge discovery, 2009. CyberC’09 (pp. 226–232). IEEE.
Kaplantzis, S., Shilton, A., Mani, N., & Şekercioğlu, Y. A. (2007). Detecting selective forwarding attacks in wireless sensor networks using support vector machines. In 3rd international conference on intelligent sensors, sensor networks and information, 2007. ISSNIP 2007 (pp. 335–340). IEEE.
Hu, Y. C., Perrig, A., & Johnson, D. B. (2003). Packet leashes: A defense against wormhole attacks in wireless networks. In INFOCOM 2003. Twenty-second annual joint conference of the IEEE computer and communications. IEEE societies (Vol. 3, pp. 1976–1986). IEEE.
Newsome, J., Shi, E., Song, D., & Perrig, A. (2004). The sybil attack in sensor networks: analysis and defenses. In Proceedings of the 3rd international symposium on Information processing in sensor networks (pp. 259–268). ACM.
Hamid, M. A., Mamun-Or-Rashid, M., & Hong, C. S. (2006). Routing security in sensor network: HELLO flood attack and defense (pp. 77–81). Dhaka, Bangaladesh: Proceedings of IEEE ICNEWS.
Hu, Y., Lin, Y., Liu, Y., & Zeng, W. (2007). RAS: A robust authentication scheme for filtering false data in wireless sensor networks. In 15th IEEE international conference on networks, 2007. ICON 2007. (pp. 200–205). IEEE.
Bloom, B. H. (1970). Space/time trade-offs in hash coding with allowable errors. Communications of the ACM, 13(7), 422–426.
Choi, H. M., Nam, S. M., Cho, T. H., et al. (2013). A secure routing method for detecting false reports and wormhole attacks in wireless sensor networks. Wireless Sensor Network, 5(03), 33.
Liu, Z., Wang, J., Zhang, S., Liu, H., & Zhang, X. (2014). A cluster-based false data filtering scheme in wireless sensor networks. Adhoc and Sensor Wireless Networks, 23(01), 21–45.
Royer, E. M., & Toh, C. K. (1999). A review of current routing protocols for ad hoc mobile wireless networks. IEEE Personal Communications, 6(2), 46–55.
Tsudik, G. (1992). Message authentication with one-way hash functions. ACM SIGCOMM Computer Communication Review, 22(5), 29–38.
Ren, K., Lou, W., & Zhang, Y. (2008). Leds: Providing location-aware end-to-end data security in wireless sensor networks. IEEE Transactions on Mobile Computing, 7(5), 585–598.
Fakhrey, H., Tiwari, R., Johnston, M., & Al-Mathehaji, Y. A. (2016). The optimum design of location-dependent key management protocol for a WSN with a random selected cell reporter. IEEE Sensors Journal, 16(19), 7217–7226.
Wang, J., Liu, Z., Zhang, S., & Zhang, X. (2014). Defending collaborative false data injection attacks in wireless sensor networks. Information Sciences, 254, 39–53.
Rabaey, C. S. J., & Langendoen, K. (2002). Robust positioning algorithms for distributed ad-hoc wireless sensor networks. In USENIX technical annual conference (pp. 317–327).
Patwari, N., Hero, A. O, I. I. I., Perkins, M., Correal, N. S., & O’dea, R. J. (2003). Relative location estimation in wireless sensor networks. IEEE Transactions on Signal Processing, 51(8), 2137–2148.
Nam, S. M., & Cho, T. H. (2016). Context-aware architecture for probabilistic voting-based filtering scheme in sensor networks. IEEE Transactions on Mobile Computing. doi:10.1109/TMC.2016.2641219.
Li, F., & Wu, J. (2006). A probabilistic voting-based filtering scheme in wireless sensor networks. In Proceedings of the 2006 international conference on Wireless communications and mobile computing (pp. 27–32). ACM.
Yu, Z., & Guan, Y. (2010). A dynamic en-route filtering scheme for data reporting in wireless sensor networks. IEEE/ACM Transactions on Networking, 18(1), 150–163.
Yuan, T., Zhang, S., Zhong, Y., & Ma, J. (2008). KAEF: An en-route scheme of filtering false data in wireless sensor networks. In IEEE International performance, computing and communications conference, 2008. IPCCC 2008 (pp. 193–200). IEEE.
Lamport, L. (1981). Password authentication with insecure communication. Communications of the ACM, 24(11), 770–772.
Zhu, S., Setia, S., & Jajodia, S. (2006). Leap+: Efficient security mechanisms for large-scale distributed sensor networks. ACM Transactions on Sensor Networks (TOSN), 2(4), 500–528.
Yang, X., Lin, J., Yu, W., Moulema, P. M., Fu, X., & Zhao, W. (2015). A novel en-route filtering scheme against false data injection attacks in cyber-physical networked systems. IEEE Transactions on Computers, 64(1), 4–18.
Kraub, C., Schneider, M., Bayarou, K., & Eckert, C. (2007). STEF: A secure ticket-based en-route filtering scheme for wireless sensor networks. In: The second international conference on Availability, reliability and security, 2007. ARES 2007 (pp. 310–317). IEEE.
Ma, J., Zhang, S., Zhong, Y., & Tong, X. (2006). SeLoc: Secure localization for wireless sensor and actor network. In 2006 IEEE international conference on mobile adhoc and sensor systems (MASS) (pp. 864–869). IEEE.
Sastry, N., Shankar, U., & Wagner, D. (2003). Secure verification of location claims. In Proceedings of the 2nd ACM workshop on wireless security (pp. 1–10). ACM.
Chan, H., Luk, M., & Perrig, A. (2005). Using clustering information for sensor network localization. In V. K. Prasanna, S. S. Iyengar, P. G. Spirakis, & M. Welsh (Eds.), Distributed computing in sensor systems (pp. 109–125). Berlin, Heidelberg: Springer.
Eschenauer, L., & Gligor, V. D. (2002). A key-management scheme for distributed sensor networks. In Proceedings of the 9th ACM conference on computer and communications security (pp. 41–47). ACM.
Chan, H., Perrig, A., & Song, D. (2003). Random key predistribution schemes for sensor networks. In Proceedings of 2003 symposium on security and privacy, 2003 (pp. 197–213). IEEE.
Liu, D., Ning, P., & Li, R. (2005). Establishing pairwise keys in distributed sensor networks. ACM Transactions on Information and System Security (TISSEC), 8(1), 41–77.
Luk, M., Perrig, A., & Whillock, B. (2006). Seven cardinal properties of sensor network broadcast authentication. In Proceedings of the fourth ACM workshop on security of ad hoc and sensor networks (pp. 147–156). ACM.
Chen, Y. S., & Lei, C. L. (2010). Filtering false messages en-route in wireless multi-hop networks. In 2010 IEEE wireless communications and networking conference (WCNC) (pp. 1–6). IEEE.
Dharmapurikar, S., Krishnamurthy, P., Sproull, T., & Lockwood, J. (2003). Deep packet inspection using parallel bloom filters. In Proceedings of 11th symposium on high performance interconnects, 2003 (pp. 44–51). IEEE.
Lu, R., Lin, X., Zhu, H., Liang, X., & Shen, X. (2012). Becan: A bandwidth-efficient cooperative authentication scheme for filtering injected false data in wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 23(1), 32–43.
Liu, A., & Ning, P. (2008). TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks. In International conference on information processing in sensor networks, 2008. IPSN’08 (pp. 245–256). IEEE.
Wang, H., Sheng, B., Tan, C. C., & Li, Q. (2008). Comparing symmetric-key and public-key based security schemes in sensor networks: A case study of user access control. In The 28th international conference on distributed computing systems, 2008. ICDCS’08 (pp. 11–18). IEEE.
Yu, H., & He, J. (2013). Authentication and en-route data filtering for wireless sensor networks in the internet of things scenario. International Journal of Grid and Distributed Computing, 6(1), 1–12.
Shahzad, M. K., & Cho, T. H. (2017). An energy-aware routing and filtering node (ERF) selection in CCEF to extend network lifetime in WSN. IETE Journal of Research. doi:10.1080/03772063.2016.1241721.
Čapkun, S., & Hubaux, J. P. (2005). Secure positioning of wireless devices with application to sensor networks. In Proceedings of IEEE INFOCOM 2005. 24th annual joint conference of the IEEE computer and communications societies (Vol. 3, pp. 1917–1928). IEEE.
Lazos, L., & Poovendran, R. (2004). SeRLoc: Secure range-independent localization for wireless sensor networks. In Proceedings of the 3rd ACM workshop on wireless security (pp. 21–30). ACM.
Lazos, L., Poovendran, R., & Čapkun, S. (2005). Rope: Robust position estimation in wireless sensor networks. In Proceedings of the 4th international symposium on Information processing in sensor networks (p. 43). IEEE Press.
Karp, B., & Kung, H. T. (2000). GPSR: Greedy perimeter stateless routing for wireless networks. In Proceedings of the 6th annual international conference on Mobile computing and networking (pp. 243–254). ACM.
Yu, Y., Govindan, R., & Estrin, D. (2001). Geographical and energy aware routing: A recursive data dissemination protocol for wireless sensor networks.
Marti, S., Giuli, T. J., Lai, K., & Baker, M. (2000). Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of the 6th annual international conference on mobile computing and networking (pp. 255–265). ACM.
Qadir, J., & Hasan, O. (2015). Applying formal methods to networking: Theory, techniques, and applications. IEEE Communications Surveys and Tutorials, 17(1), 256–291.
De Moura, L., & Bjørner, N. (2008) Z3: An efficient SMT solver. In International conference on tools and algorithms for the construction and analysis of systems (pp. 337–340). Springer.
Nipkow, T., Paulson, L. C., & Wenzel, M. (2002). Isabelle/HOL: A proof assistant for higher-order logic (Vol. 2283). New York: Springer.
Holzmann, G. (2003). Spin model checker, the: Primer and reference manual. Boston: Addison-Wesley.
Xie, G. G., Zhan, J., Maltz, D. A., Zhang, H., Greenberg, A., Hjalmtysson, G., & Rexford, J.: On static reachability analysis of ip networks. In Proceedings of IEEE INFOCOM 2005. 24th annual joint conference of the IEEE computer and communications societies (Vol. 3, pp. 2170–2183). IEEE.
Narain, S., et al. (2005). Network configuration management via model finding. LISA, 5, 15–15.
Singh, V. P., Jain, S., Singhai, J. (2010). Hello flood attack and its countermeasures in wireless sensor networks. IJCSI International Journal of Computer Science Issues, 7(11), 23–27.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Rights and permissions
About this article
Cite this article
Kumar, A., Pais, A.R. En-Route Filtering Techniques in Wireless Sensor Networks: A Survey. Wireless Pers Commun 96, 697–739 (2017). https://doi.org/10.1007/s11277-017-4197-0
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-017-4197-0