Browse > Article

Trust-Based Filtering of False Data in Wireless Sensor Networks  

Hur, Jun-Beom (한국과학기술원 전산학과)
Lee, Youn-Ho (한국과학기술원 전산학과)
Yoon, Hyun-Soo (한국과학기술원 전산학과)
Abstract
Wireless sensor networks are expected to play a vital role in the upcoming age of ubiquitous computing such as home environmental, industrial, and military applications. Compared with the vivid utilization of the sensor networks, however, security and privacy issues of the sensor networks are still in their infancy because unique challenges of the sensor networks make it difficult to adopt conventional security policies. Especially, node compromise is a critical threat because a compromised node can drain out the finite amount of energy resources in battery-powered sensor networks by launching various insider attacks such as a false data injection. Even cryptographic authentication mechanisms and key management schemes cannot suggest solutions for the real root of the insider attack from a compromised node. In this paper, we propose a novel trust-based secure aggregation scheme which identifies trustworthiness of sensor nodes and filters out false data of compromised nodes to make resilient sensor networks. The proposed scheme suggests a defensible approach against the insider attack beyond conventional cryptographic solutions. The analysis and simulation results show that our aggregation scheme using trust evaluation is more resilient alternative to median.
Keywords
trust evaluation; security; secure aggregation; resilient sensor networks;
Citations & Related Records
연도 인용수 순위
  • Reference
1 B. Przydatek, D. Song, A. Perrig, SIA: Secure Information Aggregation in Sensor Networks, SenSys 2003
2 L. Hu and D. Evans, Secure Aggregation for Wireless Networks, In Workshop on Security and Assurance in Ad hoc Networks. January 2003
3 S. Zhu, S. Setia, S. Jajodia, P. Ning, An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks, Proceedings of IEEE Symposium on Security and Privacy, Oakland, California, May 2004
4 F. Ye, H. Luo, L. Zhang, Statistical En-route Detection and Filtering of Injected False Data in Sensor Networks, Proceedings of IEEE INFOCOM 2004
5 Z. Yan, P. Zhang, T. Virtanen, Trust Evaluation Based Security Solution in Ad Hoc Networks, NordSec 2003, Proceedings of the Seventh Nordic Workshop on Secure IT Systems, 15th-17th October 2003
6 A. Mahimkar, T. S. Rappaport, SecureDAV: A Secure Data Aggregation and Verification Protocol for Sensor Networks, Proceedings of IEEE Global Telecommunications Conference (Globecom) 2004, Dallas, TX, Nov 29 - Dec 3, 2004
7 H. Yang, F. Ye, Y. Yuan, S. Lu, W. Arbaugh, Toward Resilient Security in Wireless Sensor Networks, Proceedings of the 6th ACM International Symposium on Mobile Ad hoc Networking and Computing, Urbana-Champaign, Illinois, USA, May 2005
8 N. Sastry, U. Shankar, D. Wagner, Secure Verification of Location Claims, Proceedings of the 2003 ACM workshop on Wireless security
9 C. Karlof, D. Wagner, Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures, NEST 2003
10 N. Shrivastava, C. Buragohain, D. Agrawal, S. Suri, Medians and Beyond: New Aggregation Techniques for Sensor Networks, Proceedings of the Second ACM Conference on Embedded Networked Sensor Systems (SenSys 2004), August 16 2004
11 A. Perrig, J. Stankovic, D. Wagner, Security in Wireless Sensor Networks, Communication of the ACM, June 2004
12 H. Chan and A. Perrig, Security and Privacy in Sensor Networks, IEEE Computer 2003
13 A. Perrig, R. Szewczyk, V. Wen, D. Culler, J.D. Tygar, SPINS: Security Protocols for Sensor Networks, Wireless Networks Journal (WINE), September 2002
14 H. Chan, A. Perrig, D. Song, Random key predistribution schemes for sensor networks, IEEE Symposium on Security and Privacy, Berkely, California, May 11-14 2003, pp. 197-213
15 X. Ji, H. Zha, Robust Sensor Localization Algorithm in Wireless Ad-hoc Sensor Networks, Proceedings of the 12th International Conference on Computer Communications and Networks (ICCCN03), 2003
16 L. Buttyan, P. Schaffer, I. Vajda, Resilient Aggregation with Attack Detection in Sensor Networks, Proceedings of the Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, 2006
17 David Wagner, Resilient Aggregation in Sensor Networks, ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN '04), October 25, 2004
18 L. Lazos, R. Poovendran, SeRLoc: Secure Range- Independent Localiztion for Wireless Sensor Networks, Proceedings of the 2004 ACM Workshop on Wireless Security, pp. 21-30, 2004
19 A. Pirzada, C. McDonald, Establishing Trust In Pure Ad-hoc Networks, Proceedings of the 27th conference on Australasian computer science, 2004
20 W. Du, J. Deng, Y.S. Han, P.K. Varshney, A pairwise key pre-distribution scheme for wireless sensor networks, Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS), Washington, DC, USA, October 27-31 2003, pp. 42-51
21 S.S. Doumit, D.P. Agrawal, Self-Organized Criticality and Stochastic learning based intrusion detection system for wireless sensor networks, Military Communications Conference, 2003. MILCOM '03. 2003 IEEE, pp. 609-614
22 S. B. Wicker, M. D. Bartz, Type-II Hybrid-ARQ Protocols Using Punctured MDS Codes, Proceedings of IEEE Transactions on Communications, April 1994
23 Z. Li, W. Trappe, Y. Zhang, B. Nath, Robust Statistical Methods for Securing Wireless Localization in Sensor Networks, IPSN 2005, Los Angeles, April 2005
24 R. Pickholtz, D. Schilling, L. Milstein, Theory of Spread Spectrum Communications - A Tutorial, IEEE Transactions on Communications, pp. 855- 884, May 1982