A Double Key-Sharing Based False Data Filtering Scheme in Wireless Sensor Networks | IEEE Conference Publication | IEEE Xplore

A Double Key-Sharing Based False Data Filtering Scheme in Wireless Sensor Networks


Abstract:

In wireless sensor networks, the attackers can inject false data reports containing bogus readings or non- existent events from compromising nodes, which may result in fa...Show More

Abstract:

In wireless sensor networks, the attackers can inject false data reports containing bogus readings or non- existent events from compromising nodes, which may result in false alarms, interfere decision making, and drain out the limited energy of the network. Existing approaches to filter false reports, notably statistical en-route filtering, share keys between the nodes in low probabilities, and rely on the forwarding nodes to verify the correctness of the MACs (Message Authentication Codes) carried in each report. As a result, false reports have to travel multiple hops before being detected and filtered, and thus lead to the waste of energy of the network. A Double key-Sharing based false data Filtering scheme (DSF) in this paper is proposed to cope with this problem, in which nodes are grouped into clusters and each cluster head establishes relationship with the nodes closer through pairwise keys to form a blocked region. Furthermore, each pair of nodes shares symmetric keys randomly. When an event occurs, a legitimate report must carry two types of MACs. In filtering phase, each forwarding node validates not only the correctness of these two types of MACs carried in the report, but also drops part of the tail of the reports just outside the blocked region. Extensive analyses and simulations show that DSF outperforms existing schemes in terms of filtering efficiency and energy consumption.
Date of Conference: 16-18 November 2011
Date Added to IEEE Xplore: 02 January 2012
Print ISBN:978-1-4577-2135-9

ISSN Information:

Conference Location: Changsha, China

I. Introduction

Wireless sensor networks (WSN) are ideal candidates to monitor the environment in various applications such as military surveillance, habitat monitoring and health care [1]. For this network, large amount of sensor nodes with limited resources are deployed in a hostile environment. Once a node is compromised, all the keys stored in it will be disclosed by the attacker, and the attacker can easily launch false data injection attacks, i.e., attackers can abuses the keys to inject bogus data reports into sensor networks [2]. This attack may cause not only false alarms but also the depletion of the limited resources of the network.

References

References is not available for this document.