Skip to main content

Advertisement

Log in

A partial key pre-distribution based en-route filtering scheme for wireless sensor networks

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

Compromised sensor nodes can be used to inject false reports (bogus reports) in wireless ssensor networks (WSNs). This can cause the sink to take wrong decisions. En-route filtering is a method to detect and filter false reports from WSNs. Most of the existing en-route filtering schemes use probabilistic approaches to filter false reports from the network, where filtering of false reports is based on a fixed probability. Thus false reports can travel multiple hops before being dropped. In this article we seek to overcome limitations of the existing schemes and reduce the overall key storage overhead in the cluster heads. In this article we propose a combinatorial design based partial en-route filtering scheme (CD-PEFS) which filters the fabricated reports deterministically. CD-PEFS reduces the energy requirements in the network by early detection and elimination of the false reports. Adoption of combinatorial design based keys get rid of shared key discovery phase from the network. This considerably reduces the communication overhead in the network. We carried out a detailed analysis of CD-PEFS against an increasing number of compromised sensor nodes in the network. We found that our scheme performs better than existing schemes in terms of filtering efficiency while maintaining low key storage overhead in the network. Further the performance of CD-PEFS is at par with existing schemes in terms of other protocol overheads.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  • Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E (2002) A survey on sensor networks. IEEE Commun Mag 40(8):102–114

    Article  Google Scholar 

  • Anderson I (1990) Combinatorial designs: construction methods. Ellis Horwood, New York

    MATH  Google Scholar 

  • Dickson LE (2003) Linear groups: with an exposition of the Galois field theory. Courier Corporation, Chelmsford

    Google Scholar 

  • Ferng HW, Khoa NM (2017) On security of wireless sensor networks: a data authentication protocol using digital signature. Wirel Netw 23(4):1113–1131

    Article  Google Scholar 

  • Harb H, Makhoul A, Jaoude CA (2018) En-route data filtering technique for maximizing wireless sensor network lifetime. In: 2018 14th international wireless communications & mobile computing conference (IWCMC), IEEE, pp 298–303

  • He T, Huang C, Blum BM, Stankovic JA, Abdelzaher T (2003) Range-free localization schemes for large scale sensor networks. In: Proceedings of the 9th annual international conference on Mobile computing and networking, ACM, pp 81–95

  • Kc GS, Keromytis AD, Prevelakis V (2003) Countering code-injection attacks with instruction-set randomization. In: Proceedings of the 10th ACM conference on computer and communications security, ACM, pp 272–280

  • Kraub C, Schneider M, Bayarou K, Eckert C (2007) Stef: a secure ticket-based en-route filtering scheme for wireless sensor networks. In: Availability, reliability and security, (2007) ARES 2007. The second international conference on, IEEE, pp 310–317

  • Kumar A, Pais AR (2017) En-route filtering techniques in wireless sensor networks: a survey. Wirel Personal Commun 96(1):697–739

    Article  Google Scholar 

  • Kumar A, Pais AR (2018a) Deterministic en-route filtering of false reports: a combinatorial design based approach. IEEE Access 6:74494–74505

    Article  Google Scholar 

  • Kumar A, Pais AR (2018b) A new combinatorial design based key pre-distribution scheme for wireless sensor networks. J Ambient Intell Human Comput 10(6):2401–2416

    Article  Google Scholar 

  • Nam SM, Cho TH (2016) Context-aware architecture for probabilistic voting-based filtering scheme in sensor networks. IEEE Transact Mob Comput 16(10):2751–2763

    Article  Google Scholar 

  • Patwari N, Ash JN, Kyperountas S, Hero AO, Moses RL, Correal NS (2005) Locating the nodes: cooperative localization in wireless sensor networks. IEEE Signal Process Mag 22(4):54–69

    Article  Google Scholar 

  • Perrig A, Stankovic J, Wagner D (2004) Security in wireless sensor networks. Commun ACM 47(6):53–57

    Article  Google Scholar 

  • Przydatek B, Song D, Perrig A (2003) Sia: Secure information aggregation in sensor networks. In: Proceedings of the 1st international conference on embedded networked sensor systems, ACM, pp 255–265

  • Ren K, Lou W, Zhang Y (2008) Leds: providing location-aware end-to-end data security in wireless sensor networks. IEEE Transact Mob Comput 7(5):585–598

    Article  Google Scholar 

  • Ruj S, Roy B (2010) Key predistribution using combinatorial designs for grid-group deployment scheme in wireless sensor networks. ACM Transact Sens Netw (TOSN) 6(1):1–28

    Google Scholar 

  • Shamir A (1979) How to share a secret. Commun ACM 22(11):612–613

    Article  MathSciNet  Google Scholar 

  • Stinson DR (2007) Combinatorial designs: constructions and analysis. Springer, Berlin/Heidelberg

    MATH  Google Scholar 

  • Xing K, Cheng X (2010) From time domain to space domain: detecting replica attacks in mobile ad hoc networks. In: INFOCOM, 2010 Proceedings IEEE, IEEE, pp 1–9

  • Yang H, Lu S (2004) Commutative cipher based en-route filtering in wireless sensor networks. In: Vehicular technology conference, 2004. VTC2004-Fall. 2004 IEEE 60th, IEEE, vol 2, pp 1223–1227

  • Yang H, Ye F, Yuan Y, Lu S, Arbaugh W (2005) Toward resilient security in wireless sensor networks. In: Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing, ACM, pp 34–45

  • Yang X, Lin J, Yu W, Moulema PM, Fu X, Zhao W (2015) A novel en-route filtering scheme against false data injection attacks in cyber-physical networked systems. IEEE Transact Comput 64(1):4–18

    Article  MathSciNet  Google Scholar 

  • Ye F, Luo H, Lu S, Zhang L (2005a) Statistical en-route filtering of injected false data in sensor networks. IEEE J Sel Areas Commun 23(4):839–850

    Article  Google Scholar 

  • Ye F, Zhong G, Lu S, Zhang L (2005b) Gradient broadcast: a robust data delivery protocol for large scale sensor networks. Wirel Netw 11(3):285–298

    Article  Google Scholar 

  • Yu L, Li J (2009) Grouping-based resilient statistical en-route filtering for sensor networks. In: INFOCOM 2009. IEEE, IEEE, pp 1782–1790

  • Zhu S, Setia S, Jajodia S, Ning P (2004) An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks. Security and privacy, 2004. In: Proceedings 2004 IEEE symposium on, IEEE, pp 259–271

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Alok Kumar.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kumar, A., Bansal, N. & Pais, A.R. A partial key pre-distribution based en-route filtering scheme for wireless sensor networks. J Ambient Intell Human Comput 12, 1471–1486 (2021). https://doi.org/10.1007/s12652-020-02216-3

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-020-02216-3

Keywords

Navigation