A fuzzy-based interleaved multi-hop authentication scheme in wireless sensor networks

https://doi.org/10.1016/j.jpdc.2009.01.007Get rights and content

Abstract

In sensor networks, a compromised node can either generate fabricated reports with false votes or inject false votes into real reports, which causes severe damage such as false alarms, energy drain and information loss. An interleaved hop-by-hop authentication (IHA) scheme addresses the former attack by detecting and filtering false reports in a deterministic and hop-by-hop fashion. Unfortunately, in IHA, all en-route nodes must join to verify reports while only a few are necessary to the authentication procedure. In this paper, we propose a fuzzy-based interleaved multi-hop authentication scheme based on IHA. In our scheme, the fuzzy logic system only selects some nodes for verification based on the network characteristics. Moreover, we apply a voting method and a hash-based key assignment mechanism to improve network security. Through performance evaluation, the proposed scheme is found to save up to 13% of the energy consumption and to provide more network protection compared to IHA.

Introduction

Wireless sensor networks (WSNs) have been used in ubiquitous computing systems in recent years. A WSN consists of multi-affection sensor nodes which comprise a data collection module, a data process and control module, a communication module, and an energy module [2], [4]. In most applications, such as military surveillance, sensor nodes are deployed in open, large-scale, or even hostile environments. Therefore they are unattended and subject to the threat of capture and security compromise [21]. Additionally, the power of the sensor nodes is limited and irreplaceable [7], [15], [19]. Hence, security and energy efficiency are the most challenging aspects in the design of WSNs.

When a node is compromised by fabricated messages or is physically attacked, attackers can achieve full control over the captured node and are then able to read its memory and influence the operation of the node software [10]. On the one hand, compromised nodes may generate false reports, which is called false negative attacks as shown in Fig. 1(a). This leads to energy drain and false alarms. On the other hand, compromised nodes may inject false Message Authentication Codes (MACs) into real reports, which is called false positive attacks as shown in Fig. 1(b). As a result, the report containing false MACs is detected and dropped by another upper stream node, and thereby the base station (BS) loses the information in this report [13], [20].

Recently, many en-route filtering schemes have been researched and developed [11], [12], [13], [21], [22], [24]. To minimize the grave damage resulting from false negative attacks, these schemes filter false reports en-route, and the few missed reports should then be rejected at the BS [21]. In the interleaved hop-by-hop authentication (IHA) scheme [24], reports are verified and filtered by every en-route node and finally by the BS. The IHA defines a simple but effective filtering scheme based on association among nodes. Its design goal is to guarantee that the BS can detect a false report as long as no more than t nodes are compromised. Here t is a security threshold. However, there are some disadvantages with the IHA. Since all intermediate nodes are verification nodes, which consume more energy than general en-route nodes, this scheme is not very efficient in saving energy. Additionally, the IHA depends on deterministic key sharing in which each node must share its secret key with its associated nodes, thereby weakening the security of the network. Another drawback of the IHA is that it only handles false negative attacks while false positive attacks may easily occur. A probabilistic voting-based filtering scheme (PVFS) is presented to address false positive attacks [13]. In this scheme, a verification node will not immediately discard a report which carries a false MAC. Instead, only when the number of false MACs reaches a designed threshold is the report dropped.

In this paper, a fuzzy-based interleaved multi-hop authentication (FIMA) scheme is proposed as an enhancement of the IHA. In FIMA, we introduce a fuzzy logic system to limit the number of en-route verification nodes and thereby save verification energy. To determine which nodes are suitable for verification, the fuzzy rule-based system takes advantage of fuzzy characteristics such as remaining energy, distance to the BS, and the cumulative number of false MACs. Besides, a new key assignment method in which the key of a node is calculated based on a hash function of its downstream (toward the source cluster) node’s key is presented to enhance network security and reduce key storage overhead. Moreover, FIMA also applies the voting method in PVFS to cope with false positive attacks. Accordingly, when the scheme finds a false MAC in a report, it increases the number of detected false MACs. When this number equals to the predefined threshold, the scheme drops the report. Through analysis and simulation, we found that the scheme can save up to 13% of the total energy consumption compared to the IHA, while providing more network security.

The rest of this paper is organized as follows. Section 2 highlights the background of our scheme which includes en-route filtering schemes and related work, and an overview of the IHA. In Section 3, a problem statement is presented. Subsequently, a detailed description of the proposed scheme follows in Section 4. In Section 5, the performance evaluation of the proposed scheme through analysis and simulation is shown and discussed. Finally, Section 6 concludes the study.

Section snippets

En-route filtering schemes and related work

Several en-route filtering schemes have been proposed to address false negative attacks [11], [12], [22], [24]. The Statistical En-route Filtering (SEF) scheme was the first method proposed to address this kind of attack and introduce an en-route filtering framework [22]. It assumes that when an event occurs, several nearby nodes will detect and generate MACs attached to the event report and forward it to the BS. Along the path to the BS, each en-route node verifies the report based on its

Problem statement

Although the IHA is very efficient in filtering false reports, there are still some drawbacks:

  • 1.

    When a report is forwarded to the BS, all nodes on the path must spend energy receiving, authenticating, and transmitting it. This leads to a waste of energy since only a few nodes are actually helpful in verifying the report.

  • 2.

    The key-sharing mechanism requires sharing association keys among all lower and upper associated nodes. Thus when a node is compromised, all of these stored keys can be exposed.

  • 3.

System model and assumptions

We consider a large-scale static sensor network which breaks down into local clusters with one node acting as the cluster head. Within a cluster, the cluster head position rotates among the sensors to prevent draining the battery of a single sensor. Once the cluster head has enough data from its cluster nodes, it aggregates the data and transmits the compressed data to the BS. For simple implementation, we use cluster head selection algorithm in LEACH [1], [9].

It is also assumed that sensor

Security analysis

The quantity and locations of the verification nodes are decided by the fuzzy logic system, and they are modified after any change to the network topology. Therefore, it is difficult for attackers to predict which nodes will verify reports and how to avoid being detected.

In our key assignment mechanism, only verification nodes store the association keys used for verification. In addition, these keys are shared after being processed with an irreversible hash function [17]. These features reduce

Conclusions

In this paper we developed a new en-route filtering scheme, FIMA, inspired by the original IHA. FIMA determines the number and location of verification nodes for the best energy savings and network security based on a fuzzy logic system. Simulations demonstrated that, compared to the IHA, FIMA saved up to 13% of the total energy consumption. Not only did FIMA address false negative attacks, but it also efficiently dealt with false positive attacks by applying a voting method for fabricated

Thao P. Nghiem received her B.S. degree in Mathematics and Computer Science from HCMC Natural Science University, Vietnam, in 2005. She is currently a graduate student in the School of Information and Communication Engineering, Sungkyunkwan University, Korea. Her research interests include wireless sensor networks, modeling and simulation, and artificial intelligence.

References (25)

  • K. Akkaya et al.

    A survey on routing protocols for wireless sensor networks

    Ad-hoc networks, Science Direct 3

    (2005)
  • J. Deng et al.

    Balanced-energy sleep scheduling scheme for high-density cluster-based sensor networks

    Computer Communications, Science Direct 28

    (2005)
  • I.F. Akyildiz et al.

    A survey on sensor networks

    IEEE Communication Magazine

    (2002)
  • J.F. Baldwin

    Fuzzy Logic

    (1996)
  • Crossbow network,...
  • A.A. Elsamiee, The development of AWS AND introductory to the IWS, intelligent weather system, in: TECO 2006–WMO...
  • A.C. Ferreira et al.

    On the security of cluster-cased communication protocols for wireless sensor networks

    Lecture Note in Computer Science

    (2005)
  • Free Fuzzy Logic Library,...
  • W.R. Heinzelman, A. Chandrakasan, H. Balakrishnan, Energy-efficient communication protocol for wireless microsensor...
  • H. Karl et al.

    Protocols and Architectures for Wireless Sensor Networks

    (2005)
  • H.Y. Lee et al.

    Key inheritance-based false data filtering scheme in wireless sensor networks

  • H.Y. Lee et al.

    Fuzzy adaptive selection of filtering schemes for energy saving in sensor networks

    IEICE Transactions on Communications

    (2007)
  • Cited by (0)

    Thao P. Nghiem received her B.S. degree in Mathematics and Computer Science from HCMC Natural Science University, Vietnam, in 2005. She is currently a graduate student in the School of Information and Communication Engineering, Sungkyunkwan University, Korea. Her research interests include wireless sensor networks, modeling and simulation, and artificial intelligence.

    Tae Ho Cho received a Ph.D. degree in Electrical and Computer Engineering from the University of Arizona, USA, in 1993, and B.S. and M.S. degrees in Electrical Engineering from Sungkyunkwan University, Korea, and the University of Alabama, USA, respectively. He is currently a Professor in the School of Information and Communication Engineering, Sungkyunkwan University, Korea. His research interests are in the areas of wireless sensor networks, intelligent systems, modeling and simulation, and enterprise resource planning.

    This work was supported by the Korea Research Foundation Grant funded by the Korean Government (KRF-2008-313-D00827).

    View full text