Browse > Article
http://dx.doi.org/10.5762/KAIS.2012.13.1.382

Probabilistic Filtering Method for Efficient Sensor Network Security  

Kim, Jin-Su (Division of Port & Logistics, Tongmyong University)
Shin, Seung-Soo (Dept. of Information Security, College of Information & Communication, Tongmyong University)
Publication Information
Journal of the Korea Academia-Industrial cooperation Society / v.13, no.1, 2012 , pp. 382-389 More about this Journal
Abstract
The fabricated report attack will not only cause false alarms that waste real-world response efforts such as sending response teams to the event location, but also drains the finite amount of energy in a wireless sensor network. In this paper, we propose a probabilistic filtering method for sensor network security (PFSS) to deal with filtering for the fabricated report. On the basis of filtering scheme, PFSS combines cluster-based organization and probabilistic verification node assignment using distance of from cluster head to base station for energy efficiency and hot spot problem. Through both analysis and simulation, we demonstrate that PFSS could achieve efficient protection against fabricated report attack while maintaining a sufficiently high filtering power.
Keywords
Wireless sensor network; Fabricated report; Probabilistic verification node assignment; Filtering scheme; Cluster-based organization; Hot spot problem;
Citations & Related Records
연도 인용수 순위
  • Reference
1 H. Yang, F. Ye, Y. Yuan, S. Lu, and W. Arbaugh, "Toward Resilient Security in Wireless Sensor Networks," In ACM Proceedings of MobiHoc 2005, 2005, pp.34-45.
2 S. Zhu, S. Setia, S. Jajodia, and P. Ning, "An Interleaved Hop-by-Hop Authentication Scheme for Filtering False Data in Sensor Networks," IN IEEE Proceedings of Symposium on Security and Privacy 2004, 2004, pp.259-271.
3 S. Zhu, S. Setia, and S. Jajodia, "LEAP: efficient security mechanisms for large-scale distributed sensor networks," In 10th ACM conference on Computer and communication security, pp. 62-72. 2003.
4 O. Goldreich, S. Goldwasser, and S. Micali, "How to Construct Random Functions," Journal of the ACM, Vol. 33, No. 4, 1986, pp 210-217.
5 Sang-Jin Lee, Tae-Ho Cho, "The Desision Method for Security Threshold according to Dynamic Environment on Wireless Sensor Networks," Proceedings of KISS Spring Conference 2009 Vol. 19, No. 1
6 S. Soro and W.Heinzelman, "Prolonging the Lifetime of Wireless Sensor Networks via Unequal Clustering," Proceedings of the 5th International Workshop on Algorithms for Wireless, Mobile, Ad Hoc and Sensor Networks (IEEE WMAN '05), April 2005.
7 F. Ye, H. Luo, S. Lu, and L. Zhang, "Statistical En-route Filtering of Injected False Data in Sensor Networks," IN IEEE Proceedings of INFOCOM 2004, 2004, pp.839-850.
8 F. Li and J. Wu, "A probabilistic voting-based filtering scheme in wireless sensor networks," Proc. IWCMC, pp.27-.32, July 2006.