Browse > Article
http://dx.doi.org/10.3837/tiis.2018.09.005

Efficient Geographical Information-Based En-route Filtering Scheme in Wireless Sensor Networks  

Yi, Chuanjun (College of Computer Science and Technology, Nanjing University of Posts and Telecommunications)
Yang, Geng (College of Computer Science and Technology, Nanjing University of Posts and Telecommunications)
Dai, Hua (College of Computer Science and Technology, Nanjing University of Posts and Telecommunications)
Liu, Liang (College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics)
Chen, Yunhua (Nanjing Institute of Mechatronic Technology)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.12, no.9, 2018 , pp. 4183-4204 More about this Journal
Abstract
The existing en-route filtering schemes only consider some simple false data injection attacks, which results in lower safety performance. In this paper, we propose an efficient geographical information-based en-route filtering scheme (EGEFS), in which each forwarding node verifies not only the message authentication codes (MACs), but also the report identifier and the legitimacy and authenticity of locations carried in a data report. Thus, EGEFS can defend against not only the simple false data injection attacks and the replay attack, but also the collusion attack with forged locations proposed in this paper. In addition, we propose a new method for electing the center-of-stimulus (CoS) node, which can ensure that only one detecting node will be elected as the CoS node to generate one data report for an event. The simulation results show that, compared to the existing en-route filtering schemes, EGEFS has higher safety performance, because it can resist more types of false data injection attacks, and it also has higher filtering efficiency and lower energy expenditure.
Keywords
Wireless sensor network; geographical information; false data injection; en-route filtering; compromised node;
Citations & Related Records
연도 인용수 순위
  • Reference
1 R. Lu, X. Lin, H. Zhu, X. Liang and X. Shen, "BECAN: a bandwidth-efficient cooperative authentication scheme for filtering injected false data in wireless sensor networks," IEEE Transactions on Parallel & Distributed Systems, vol. 23, no. 1, pp. 32-43, January, 2012.   DOI
2 J. Wang, Z. Liu, S. Zhang and X. Zhang, "Defending collaborative false data injection attacks in wireless sensor networks," Information Sciences, vol. 254, no. 1, pp. 39-53, January, 2014.   DOI
3 Q. Sun and M. Wu, "A double key-sharing based false data filtering scheme in wireless sensor networks," Journal of Computers, vol. 8, no. 2, pp. 509-516, February, 2013.
4 H. Xu, H. Sun, Y. Cheng and H. Liu, "Wireless sensor networks localization based on graph embedding with polynomial mapping," Computer Networks, vol. 106, pp. 151-160, June, 2016.   DOI
5 X. Fang, Z. Jiang, L. Nan and L. Chen, "Noise-aware localization algorithms for wireless sensor networks based on multidimensional scaling and adaptive Kalman filtering," Computer Communications, vol. 101, pp. 57-68, March, 2017.   DOI
6 A. Stanoev, S. Filiposka, V. In and L. Kocarev, "Cooperative method for wireless sensor network localization," Ad Hoc Networks, vol. 40, pp. 61-72, January, 2016.   DOI
7 C. J. Yi, G. Yang, H. Dai, L. Liu and N. Li, "Switching algorithm with prediction strategy for maximizing lifetime in wireless sensor network," International Journal of Distributed Sensor Networks, pp. 1-12, November, 2015.
8 B. Karp and H. T. Kung, "GPSR: greedy perimeter stateless routing for wireless networks," in Proc. of 6th Annual International Conference on Mobile Computing and Networking, pp. 243-254, August, 2000.
9 S. Majumder, T. Mondal and M. J. Deen, "Wearable sensors for remote health monitoring," Sensors, vol. 17, pp. 1-45, January, 2017.   DOI
10 R. L. Rivest, "The RC5 encryption algorithm," in Proc. of Workshop on Fast Software Encryption, pp. 86-96, December, 1994.
11 H. W. Ferng and N. M. Khoa, "On security of wireless sensor networks: a data authentication protocol using digital signature," Wireless Networks, vol. 23, pp. 1113-1131, January, 2017.   DOI
12 V. Bapat, P. Kale, V. Shinde, N. Deshpande and A. Shaligram, "WSN application for crop protection to divert animal intrusions in the agricultural land," Computers & Electronics in Agriculture, vol. 133, pp. 88-96, February, 2017.   DOI
13 J. Lee, Z. Zhong, B. Du, S. Gutesa and K. Kim, "Low-cost and energy-saving wireless sensor network for real-time urban mobility monitoring system," Journal of Sensors, vol. 1870, pp. 1-8, September, 2015.
14 S. Kumari and H. Om, "Authentication protocol for wireless sensor networks applications like safety monitoring in coal mines," Computer Networks, vol. 104, pp. 137-154, May, 2016.   DOI
15 R. Amin and G. P. Biswas, "A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks," Ad Hoc Networks, vol. 36, pp. 58-80, May, 2016.   DOI
16 R. D. Gomes, D. V. Queiroz, A. C. L. Filho, I. E. Fonseca and M. S. Alencarand, "Real-time link quality estimation for industrial wireless sensor networks using dedicated nodes," Ad Hoc Networks, vol. 59, pp. 116-133, May, 2017.   DOI
17 O. Pereira, F. X. Standaert and S. V. Venkatesh, "Leakage-resilient authentication and encryption from symmetric cryptographic primitives," in Proc. of 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 96-108, October, 2015.
18 O. R. M. Boudia, S. M. Senouci and M. Feham, "A novel secure aggregation scheme for wireless sensor networks using stateful public key cryptography," Ad Hoc Networks, vol. 32, pp. 98-113, January, 2015.   DOI
19 R. H. Li, J. X. Yu, X. Huang and H. Cheng, "Robust reputation-based ranking on bipartite rating networks," SDM, vol. 12, pp. 612-623, April, 2012.
20 M. Rezvani, A. Ignjatovic, E. Bertino, and S. Jha, "Secure data aggregation technique for wireless sensor networks in the presence of collusion attacks," Dependable & Secure Computing IEEE Transactions on, vol. 12, no. 1, pp. 98-110, January, 2015.   DOI
21 S. Roy, M. Conti, S. Setia and S. Jajodia, "Secure data aggregation in wireless sensor networks: filtering out the attacker's impact," IEEE Transactions on Information Forensics and Security, vol. 9, no. 4, pp. 681-694, April, 2014.   DOI
22 A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen and D. E. Culler, "Spins: security protocols for sensor networks," Wireless Networks, vol. 8, no. 5, pp. 521-534, September, 2002.   DOI
23 H. Yang and S. Lu, "Commutative cipher based en-route filtering in wireless sensor networks," in Proc. of IEEE 60th Vehicular Technology Conference, pp. 1223-1227, September, 2004.
24 M. K. Shahzad and T. H. Cho, "An energy-aware routing and filtering node (ERF) selection in CCEF to extend network lifetime in WSN," IETE Journal of Research, vol. 63, pp. 368-380, February, 2017.   DOI
25 Y. Zhang, W. Liu, W. Lou and Y. Fang, "Location-based compromise-tolerant security mechanisms for wireless sensor networks," IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, pp. 247-260, February, 2006.   DOI
26 H. Wang and Q. Li, "Achieving robust message authentication in sensor networks: a public-key based approach," Wireless Networks, vol. 16, no. 4, pp. 999-1009, May, 2010.   DOI
27 H. Yu and J. He, "Authentication and en-route data filtering for wireless sensor networks in the internet of things scenario," International Journal of Grid and Distributed Computing, vol. 6, no. 1, pp. 1-12, February, 2013.
28 F. Ye, H. Luo, S. Lu and L. Zhang, "Statistical en-route filtering of injected false data in sensor networks," IEEE Journal on Selected Areas in Communications, vol. 23, no. 4, pp. 839-850, April, 2005.   DOI
29 J. Li, L. Yu, H. Gao and S. Xiong, "Grouping-enhanced resilient probabilistic en-route filtering of injected false data in wsns," IEEE Transactions on Parallel & Distributed Systems, vol. 23, no. 5, pp. 881-889, May, 2012.   DOI
30 Z. Yu and Y. Guan, "A dynamic en-route scheme for filtering false data injection in wireless sensor networks," in Proc. of 3rd International Conference on Embedded Networked Sensor Systems, pp. 1-12, November, 2005.