Message Authentication in Sensor Networks Using En-route Filtering
نویسنده
چکیده
-------------------------------------------------------------------ABSTRACT---------------------------------------------------In a large-scale sensor network individual sensors are subject to security compromises. A compromised node can be used to inject bogus sensing reports. If undetected, these bogus reports would be forwarded to the data collection point (i.e. the sink).such attacks by compromised nodes can result in not only false alarms but also the depletion of the finite amount of energy in a battery powered network. In this paper, we present a en-route filtering mechanism to detect and drop false reports during the forwarding process. Assuming that the same event can be detected by multiple sensors, in en-route each of the detecting sensors generates a keyed message authentication code (MAC) and multiple MACs are attached to the event report. En-route filtering exploits the network scale to filter out false reports through collective decision-making by multiple forwarding nodes. It can drop up to 70% of bogus reports injected by a compromised node within five hops, and reduce energy consumption by 65% or more in many cases.
منابع مشابه
Constrained Function Based En-Route Filtering for Sensor Networks
Sensor networks are vulnerable to false data injection attack and path-based DoS (PDoS) attack. While conventional authentication schemes are insufficient for solving these security conflicts, an en-route filtering scheme acts as a defense against these two attacks. To construct an efficient en-route filtering scheme, this paper first presents a Constrained Function based message Authentication...
متن کاملA Pair of Threshold Determination Method for the Dynamic filtering in Wireless Sensor Networks Based on Fuzzy Logic
Sensor networks can be easily compromised by an adversary because of hostile environments. An adversary may use compromised nodes to inject false reports into the network. The dynamic en-route scheme to filter false data injection can detect and drop such false reports during the forwarding phase. In this scheme, determining between a threshold value and the period for dissemination are importa...
متن کاملAn Enhanced Detection and Energy- Efficient En-route Filtering Scheme in Wireless Sensor Networks
Wireless sensor networks (WSNs), due to their small size, low cost, and untethered communication over a short-range, have great potential for applications and services. Due to hostile environments and an unattended nature, they are prone to many types of attacks by adversaries. False data injection attacks compromise data accuracy at the sink node and cause undesirable energy depletion at the s...
متن کاملA Report Generation Method for Defending False Negative Attacks in Ubiquitous Sensor Networks
Ye et al. proposed the statistical en-route filtering scheme to address false data injection attacks in which an adversary uses compromised nodes to inject forged reports into the network with the goal of deceiving the base station or depleting the resources of the relaying nodes. This scheme can detect such forged reports but is vulnerable to false negative attacks during the report generation...
متن کاملCooperative Bit-Compressed Authentication Scheme against Compromised Node Attacks in Wireless Sensor Networks
Sensor nodes deployed at hostile environments suffer compromise node attacks, in which an adversary injects counterfeit data into the sink causing error detection at upper level and energy wastage in en-route sensor nodes. A novel authentication scheme known as, Cooperative BitCompressed Authentication (CBA) is based on random graph characteristic of sensor node deployment and a cooperative bit...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2015