Detecting Cheating Aggregators and Report Dropping Attacks in Wireless Sensor Networks

Detecting Cheating Aggregators and Report Dropping Attacks in Wireless Sensor Networks

Mohit Virendra, Qi Duan, Shambhu Upadhyaya
ISBN13: 9781609601232|ISBN10: 1609601238|EISBN13: 9781609601256
DOI: 10.4018/978-1-60960-123-2.ch011
Cite Chapter Cite Chapter

MLA

Virendra, Mohit, et al. "Detecting Cheating Aggregators and Report Dropping Attacks in Wireless Sensor Networks." Cyber Security, Cyber Crime and Cyber Forensics: Applications and Perspectives, edited by Raghu Santanam, et al., IGI Global, 2011, pp. 146-167. https://doi.org/10.4018/978-1-60960-123-2.ch011

APA

Virendra, M., Duan, Q., & Upadhyaya, S. (2011). Detecting Cheating Aggregators and Report Dropping Attacks in Wireless Sensor Networks. In R. Santanam, M. Sethumadhavan, & M. Virendra (Eds.), Cyber Security, Cyber Crime and Cyber Forensics: Applications and Perspectives (pp. 146-167). IGI Global. https://doi.org/10.4018/978-1-60960-123-2.ch011

Chicago

Virendra, Mohit, Qi Duan, and Shambhu Upadhyaya. "Detecting Cheating Aggregators and Report Dropping Attacks in Wireless Sensor Networks." In Cyber Security, Cyber Crime and Cyber Forensics: Applications and Perspectives, edited by Raghu Santanam, M. Sethumadhavan, and Mohit Virendra, 146-167. Hershey, PA: IGI Global, 2011. https://doi.org/10.4018/978-1-60960-123-2.ch011

Export Reference

Mendeley
Favorite

Abstract

This chapter focuses on an important, challenging and yet largely unaddressed problem in Wireless Sensor Networks (WSN) data communication: detecting cheating aggregators and malicious/selfish discarding of data reports en route to the Base Stations (BSs). If undetected, such attacks can significantly affect the performance of applications. The goal is to make the aggregation process tamper-resistant so that the aggregator cannot report arbitrary values, and to ensure that silent discarding of data reports by intermediate en-route nodes is detected in a bounded fashion. In our model, individual node readings are aggregated into data reports by Aggregator Nodes or Cluster Heads and forwarded to the BS. BS performs a two-stage analysis on these reports: (a) Verification through attached proofs, (b) Comparison with Proxy Reports for ensuring arrival accuracy. Proofs are non-interactive verifiers sent with reports to attest correctness of reported values. Proxy Reports are periodically sent along alternate paths by non-aggregator nodes, piggybacked on data reports from other nodes. The model is intended as a guide for implementing security in real sensor network applications. It is simple and comprehensive, covering a variety of data formats and aggregation models: numeric and non-numeric data and aggregators located across one or multiple hops. Security analysis shows that the reports, both primary and proxy, cannot be forged by any outsiders and the contents of the reports are held confidential and the scheme is robust against collusion attacks. Lightweight design aims at minimal additional control and energy overhead. Simulation results show its fault tolerance against random and patterned node failures.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.