Browse > Article
http://dx.doi.org/10.9709/JKSS.2010.19.1.161

Static Filtering Probability Control Method Based on Reliability of Cluster in Sensor Networks  

Hur, Suh-Mahn (한국기술교육대학교 컴퓨터공학부)
Seo, Hee-Suk (한국기술교육대학교 컴퓨터공학부)
Lee, Dong-Young (명지전문대학교 정보통신과)
Kim, Tae-Kyung (서울신학대학교 교양학부)
Abstract
Sensor Networks are often deployed in unattended environments, thus leaving these networks vulnerable to false data injection attacks in which an adversary injects forged reports into the network through compromised nodes. Such attacks by compromised sensors can cause not only false alarms but also the depletion of the finite amount of energy in a battery powered network. Ye et al. proposed the Statistical En-route Filtering scheme to overcome this threat. In statistical en-route filtering scheme, all the intermediate nodes perform verification as event reports created by center of stimulus node are forwarded to the base station. This paper applies a probabilistic verification method to the Static Statistical En-route Filtering for energy efficiency. It is expected that the farther from the base station an event source is, the higher energy efficiency is achieved.
Keywords
Sensor Networks; False Report; Filtering; Probability; Cluster; Cluster reliability; Static Filtering;
Citations & Related Records
연도 인용수 순위
  • Reference
1 W. Zhang and G. Cao, "Group Rekeying for Filtering False Data in Sensor Network: A predistribution and Local Collaboration-based Approach," Proc. of INFOCOM, pp. 503-514, 2005.
2 F. Ye, H. Luo, and S. Lu, "Statistical En-Route Filtering of Injected False Data in Sensor Networks," IEEE J. Sel. Area Comm., vol. 23, no. 4, pp. 839-850, 2005.   DOI
3 H. Yang and S. Lu, "Commutative Cipher Based En-Route Filtering in Wireless Sensor Networks," in Proc. VTC, pp. 1223-1227, 2003.
4 S. Zhu, S. Setia, S. Jajodia, and P. Ning, "An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks," in Proc. S&P, pp. 259-271, 2004.
5 Z. Yu and Y. Guan, "A Dynamic En-route Scheme for Filtering False Data Injection in Wireless Sensor Networks," in Proc. SenSys, pp. 294-295, 2005.
6 I.F. Akvildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "A Survey on Sensor Networks," IEEE Commun. Mag, pp. 102-114, 2002.
7 k. Akkaya and M. Younis, "A Survey on Routing Protocols for Wireless Sensor Networks," Ad hoc Netw. 3(3), pp. 325-349, 2004.
8 B. Przydatek, D. Song., and A Perrig, "SIA: Secure Information Aggregation in Sensor Networks," ACM, Proceeding of SenSys, pp. 255-265, 2003.
9 Xu, N. "A Survey of Sensor Network Applications," Tech. Rep., University of Southern California. 2002.
10 Al-Karaki, J.N. and Kamal, A.E. "Routing techniques in wireless sensor networks: a survey," IEEE Wireless Communication Magazine, vol. 11, no. 6, pp. 6-28. 2004.   DOI   ScienceOn