Browse > Article
http://dx.doi.org/10.9708/jksci.2011.16.10.121

An Approach of False Data Identification Protocol for Minimum Communication Cost in Wireless Sensor Network  

Boonsongsrikul, Anuparp (Dept. of Information and Communication, Ajou University)
Park, Seung-Kyu (Dept. of Information and Communication, Ajou University)
Shin, Seung-Hun (Div. of Information and Computer, Ajou University)
Abstract
In wireless sensor networks, a compromised sensor node can inject false data during data aggregation. Existing solutions of securing data aggregation require high communication cost in securing data aggregation. In this paper, we propose a monitoring-based secure data aggregation protocol that minimizes communication cost of identifying the location of false data injection attacks. The main idea is that when monitoring nodes find an injected false data, their reporting messages along with Message Authentication Codes (MACs) are summarized in a single message before sending it to the Base Station (BS). Then the BS identifies the attacking node. The simulation shows that energy consumption of the proposed protocol with short and normal concatenations of MACs are 45% and 36% lower than that of an existing protocol, respectively.
Keywords
Sensor Networks; Data Aggregation; Energy Consumption; Security; False Data Injection Attacks;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 E. Shih, B. H. Calhoun, H. C. Seong, A.P. Chandrakasan,, "Energy-efficient link layer for wireless microsensor networks," Proceedings IEEE Computer Society Workshop on VLSI 2001. Emerging Technologies for VLSI Systems, pp. 16-21, 2001.
2 W. R. Heinzelman A. Ch and H. Balakrishnan, "Energy efficient communication protocol for wireless microsensor networks." Proceedings of the 33rd Hawaii International Conference on System Sciences, pp. 3005-3014, 2000.
3 Y. Fan, H. Luo, L. Songwu and Z. Lixia, "Statistical En-Route Filtering of Injected False Data in Sensor Networks," IEEE Journal on selected areas in communications, vol. 23, No. 4, pp. 839-850, 2005.   DOI   ScienceOn
4 A. Perrig, R. Szewczyk, J.D. Tygar, V. WEN and D. Culler, "SPINS: security protocols for sensor networks," Journal of Wireless Networks, vol. 8, Issue 5, pp. 521-534, 2002.   DOI   ScienceOn
5 A. Boonsongsrikul K. Lhee and M. Hong, "Securing Data Aggre gation against False Data Injection in Wireless Sensor Networks," The 12th International Conference on Advanced Communication Technology (ICACT'2010), pp. 29-34, 2010.
6 Y. Sankarasubramaniam, I.F Akyildiz and S.W McLaughlin, "Energy Effi ciency based Packet Size Optimization in Wireless Sensor Networks," Proceedings of the 1st IEEE International Workshop on Sensor Network Protocols and Applications, pp. 1-8 , 2003.
7 Y. Yang, X. Wang, S. Zhu, and G. Cao, "SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks," Proceedings of The 7th ACM International Symposium on Mobile Ad Hoc Networking and Computing(MobiHoc'06), pp. 356-367, 2006.
8 A. Boonsongsrikul, S. K. Park and S. H. Shin, "A Sextant Cluster Based Monitoring on Secure Data Aggregation and Filtering False Data in Wireless Sensor Networks," Journal of Korea Society of Computer and Information, Accepted.   DOI
9 A. Boonsongsrikul, K. Lhee and S. K. Park, "Monitoring-Based Secure Data Aggregation Protocol against a Compr omised Aggregator in Wireless Sensor Networks," Journal of Korea Information Processing Society, Accepted.   DOI
10 H. Chan, A. Perrig and D. Song, "Secure Hierarchical In- Net work Aggregation in Sensor Networks," Proceedings of conference on Computer and Communications Security(CCS'06), 2006.
11 W. He, X. Liu and H. Nguyen, K. Nahrstedt and T.T Abdelzaher, "PDA: Privacy-Preserving Data Aggregation in Wireless Sensor Networks," Proceedings of the 26th IEEE International Conference on Computer Communications. (IEEE INFOCOM 2007), pp. 2045-2053, 2007.