DOI QR코드

DOI QR Code

Probabilistic Filtering Method for Efficient Sensor Network Security

효율적인 센서 네트워크 보안을 위한 확률적인 필터링 기법

  • Kim, Jin-Su (Division of Port & Logistics, Tongmyong University) ;
  • Shin, Seung-Soo (Dept. of Information Security, College of Information & Communication, Tongmyong University)
  • Received : 2011.10.31
  • Accepted : 2012.01.05
  • Published : 2012.01.31

Abstract

The fabricated report attack will not only cause false alarms that waste real-world response efforts such as sending response teams to the event location, but also drains the finite amount of energy in a wireless sensor network. In this paper, we propose a probabilistic filtering method for sensor network security (PFSS) to deal with filtering for the fabricated report. On the basis of filtering scheme, PFSS combines cluster-based organization and probabilistic verification node assignment using distance of from cluster head to base station for energy efficiency and hot spot problem. Through both analysis and simulation, we demonstrate that PFSS could achieve efficient protection against fabricated report attack while maintaining a sufficiently high filtering power.

위조된 보고서 공격은 무선 센서 네트워크에서 이벤트가 발생한 위치에 대한 송신 응답과 같은 거짓 경보를 야기하는 것뿐만 아니라 제한된 량의 에너지를 고갈시킨다. 본 논문에서는 위조된 보고서를 필터링하기 위해 확률적인 보안 필터링 기법(PFSS: Probabilistic Filtering method for Sensor network Security)을 제안한다. 제안 내용은 클러스터 헤드와 기지국과의 거리를 이용하여 기지국까지의 중간 클러스터 헤드가 검증 노드인지를 확률적으로 선택하여 보안 검증에 필요한 에너지를 줄이고, 보안 처리에 따른 핫 스팟 문제를 완화시킨다. 제안된 기법의 성능은 수식 분석과 실험을 통하여 분석하였으며, 이를 통하여 제안된 기법이 기존의 보안 검증 처리에 비해 효율적임을 알 수 있다.

Keywords

References

  1. F. Li and J. Wu, "A probabilistic voting-based filtering scheme in wireless sensor networks," Proc. IWCMC, pp.27-.32, July 2006.
  2. F. Ye, H. Luo, S. Lu, and L. Zhang, "Statistical En-route Filtering of Injected False Data in Sensor Networks," IN IEEE Proceedings of INFOCOM 2004, 2004, pp.839-850.
  3. H. Yang, F. Ye, Y. Yuan, S. Lu, and W. Arbaugh, "Toward Resilient Security in Wireless Sensor Networks," In ACM Proceedings of MobiHoc 2005, 2005, pp.34-45.
  4. S. Zhu, S. Setia, S. Jajodia, and P. Ning, "An Interleaved Hop-by-Hop Authentication Scheme for Filtering False Data in Sensor Networks," IN IEEE Proceedings of Symposium on Security and Privacy 2004, 2004, pp.259-271.
  5. S. Zhu, S. Setia, and S. Jajodia, "LEAP: efficient security mechanisms for large-scale distributed sensor networks," In 10th ACM conference on Computer and communication security, pp. 62-72. 2003.
  6. O. Goldreich, S. Goldwasser, and S. Micali, "How to Construct Random Functions," Journal of the ACM, Vol. 33, No. 4, 1986, pp 210-217.
  7. Sang-Jin Lee, Tae-Ho Cho, "The Desision Method for Security Threshold according to Dynamic Environment on Wireless Sensor Networks," Proceedings of KISS Spring Conference 2009 Vol. 19, No. 1
  8. S. Soro and W.Heinzelman, "Prolonging the Lifetime of Wireless Sensor Networks via Unequal Clustering," Proceedings of the 5th International Workshop on Algorithms for Wireless, Mobile, Ad Hoc and Sensor Networks (IEEE WMAN '05), April 2005.