Browse > Article
http://dx.doi.org/10.3745/KIPSTC.2007.14-C.5.389

An Authentication Scheme for Filtering Injected Bogus Data in Sensor Networks  

Cho, Kwan-Tae (고려대학교 정보경영공학전문대학원)
Kim, Young-Ho (고려대학교 정보경영공학전문대학원)
Lee, Dong-Hoon (고려대학교 정보경영공학전문대학원)
Abstract
Recently, a location-based threshold-endorsement(LTE) scheme is proposed to thwart bogus data injection attacks. The scheme exhibits much greater filtering power than earlier symmetric schemes and results in enhanced energy savings. In this paper, we show that LTE has fatal vulnerabilities. We also propose an improved scheme that mitigates the weakness and thereby achieves the original claims without lessening remarkable filtering power intended in LTE.
Keywords
Security; Bogus Data Injection Attack; Sensor Networks;
Citations & Related Records
연도 인용수 순위
  • Reference
1 A. Perrig, R. Szewczyk, V. Wen, D. Cullar, and J. D. Tygar, 'SPINS: Security protocols for sensor networks,' pp. 189-199, ACM/IEEE Intemation Conference on Mobile Computing and Networking, Jul. 200l   DOI
2 Y. Zhang, W. Liu, W. Lou, and Y. Fang, 'Location-based compromise-tolerant security mechanisms for wireless sensor networks,', vo1.24, no.2, pp.247-260, IEEE JSAC, Special Issue on Security in Wireless Ad Hoc Networks, Feb. 2006   DOI   ScienceOn
3 W. Du, J. Deng, Y. S. Han, S. Chen, and P.K. Varshney, 'A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge,' pp.586-597, IEEE INFOCOM 04, Mar. 2004   DOI
4 L. Eschenauer and V. D. Gligor, 'A key-management scheme for distributed sensor networks,' pp.41-47. 2002, ACM CCS 02, Nov. 2002   DOI
5 H. Chan, A. Perrig, and D. Song, 'Random key predistribution schemes for sensor networks,' pp.197-213, IEEE Symposium on Security and Privacy, May 2003
6 D. Liu, P. Ning, and R. Li, 'Establishing Pairwise Keys in Distributed Sensor Networks,' pp.41-77, ACM Transactions on Information and System Security, Feb. 2005   DOI
7 Y. Zhang, W. Liu, W. Lou, Y. Fang, and D. Wu, 'Secure localization and authentication in ultra-wideband sensor networks,' vol.24, no.4, pp.829-835, IEEE JSAC, Special Issue on UWB Wireless Communications - Theory and Applications, Apr. 2006   DOI   ScienceOn
8 S. Zhu, S. Setia, S. Jajodia, and P. Ning, 'An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks,' pp.259-271, Proc. IEEE Symp. Security Privacy, May 2004   DOI
9 K. Barr and K. Asanovic, 'Energy aware lossless data compression,' pp.231-244, 1st Int. Conf.Mobile Syst., Applicat., Services, May 2003   DOI
10 D. Boneh, B. Lynn, and H. Shacham, 'Short signatures from the Weil pairing,' pp.514-532, in Proc, Asiacrypt' 01, Lecture Notes in Computer Science, vol. 2248, Dec. 2001   DOI   ScienceOn
11 'Digital Hash Standard,' federal information processing standards publication 180-1, Apr. 1995
12 D. J. Malan, M. Welsh, and M. D. Smith, 'A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography,' pp.71-80, IEEE SECON 04, Oct. 2004   DOI
13 W. Du, J. Deng, Y. S. Han, P.K. Varshney, J. Katz, and A. Khalili, 'A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks,' pp. 228-258, ACM Transactions on Information and System Security, Aug. 2005   DOI
14 G. Gaubatz, J. Kaps, and B. Sunar, 'Public keys cryptography in sensor networks?revisited', pp.2-18, ESAS 04, Aug. 2004
15 N. Gura, A. Patel, A. Wander, H. Eberle, and S. C. Shantz, 'Comparing elliptic curve cryptography and RSA on 8-bit CPUS,' pp.119-132, CHES 04, Lecture Notes in Computer Science, vol. 3156, Aug. 2004
16 A. Wander, N. Gura, H. Eberle, V. Gupta, and S. Chang, 'Energy analysis for public-key cryptography for wireless sensor networks,' IEEE PERCOM 05, Mar. 2005   DOI
17 R. Watro, D. Kong, S. fen Cuti, C. Gardiner, C. Lynn, and P. Kruus, 'Tinypk: Securing sensor networks with public key technology,' pp.59-64, ACM SASN 04, Oct. 2004   DOI
18 Y. Zhang, W. Liu, W. Lou, and Y. Fang, 'Securing sensor networks with location-based keys,' pp.1909-1914, IEEE WCNC 05, Mar. 2005   DOI
19 F. Ye, H. Luo, S. Lu, and L. Zhang, 'Statistical en-route filtering of injected false data in sensor networks,' vol.23, no.4, pp.839-850, IEEE JSAC, Special Issue on Self-Orgazing Distributed Collaborative Sensor Networks, Apr. 2005   DOI   ScienceOn