ISSN 0253-2778

CN 34-1054/N

Open AccessOpen Access JUSTC Original Paper

A false report filtering scheme based on neighbor watch for wireless sensor networks

Cite this:
https://doi.org/10.3969/j.issn.0253-2778.2014.04.009
  • Received Date: 03 April 2013
  • Accepted Date: 16 July 2013
  • Rev Recd Date: 16 July 2013
  • Publish Date: 30 April 2014
  • A false report filtering scheme based on neighbor watch was proposed, in which information from two-hop neighboring nodes was stored, which included IDs and MACs of T nodes from different zones. Each forwarding node sent an ACK message to its upstream node after sending a report to its downstream node. False reports generated with keys from other zones would be detected by the one-hop neighbors of the malicious node. Meanwhile, forwarding nodes and the Sink would verify the authenticity of other reports. Analysis and experimental results show that this scheme improves filtering efficiency significantly, thus reducing the impact of malicious nodes and extending the life of the sensor network.
    A false report filtering scheme based on neighbor watch was proposed, in which information from two-hop neighboring nodes was stored, which included IDs and MACs of T nodes from different zones. Each forwarding node sent an ACK message to its upstream node after sending a report to its downstream node. False reports generated with keys from other zones would be detected by the one-hop neighbors of the malicious node. Meanwhile, forwarding nodes and the Sink would verify the authenticity of other reports. Analysis and experimental results show that this scheme improves filtering efficiency significantly, thus reducing the impact of malicious nodes and extending the life of the sensor network.
  • loading
  • [1]
    崔莉, 鞠海玲, 苗勇, 等. 无线传感器网络研究进展[J].计算机研究与发展, 2005, 42(1): 163-174.
    [2]
    Perrig A, Stankovic J, Wagner D. Security in wireless sensor networks[J]. Communications of the ACM, 2004, 47(6): 53-57.
    [3]
    Ye F, Luo H, Lu S, Zhang L. Statistical en-route filtering of injected false data in sensor networks[J]. IEEE Journal on Selected Areas in Communication, 2005, 23(4): 839-850.
    [4]
    Zhu S, Setia S, Jajodia S, et al. An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks[C]// Proceedings of the 25th IEEE Symposium on Security and Privacy. Washington, USA: IEEE Press, 2004: 259-271.
    [5]
    Ma M. Resilience of sink filtering scheme in wireless sensor networks[J]. Computer Communications, 2006, 30(1): 55-65.
    [6]
    Yuan T, Zhang S Y, Zhong Y P, et al. KAEF:An en-route scheme of filtering false data in wireless sensor networks[C]// IEEE International Performance Computing and Communications Conference. Austin, USA: IEEE Press, 2008: 193-200.
    [7]
    Yu Z, Guan Y. A dynamic en-route scheme for filtering false data[C]// Proceedings of the 3rd ACM International conference on Embedded Networked Sensor Systems. Barcelona, Spain: ACM Press, 2005: 294-295.
    [8]
    Yang H, Ye F, Yuan Y, et al. Toward resilient security in wireless sensor networks[C]// Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing. Urbana-Champaign, USA: ACM Press, 2005: 34-45.
    [9]
    Yu L,Li J Z. Grouping-based resilient statistical en-route filtering for sensor networks[C]// Proceedings of 28th International Conference on Computer and Communications, Joint Conference of the IEEE Computer and Communications Societies. Rio de Janeiro, Brazil: IEEE Press, 2009: 1 782-1 790.
    [10]
    Marti S, Giuli T, Lai K, et al. Mitigating Routing Misbehavior in Mobile Ad Hoc Networks[C]// Proceedings of the 6th Annual International Conference on Mobile Computing and Networking. Boston, USA: ACM Press, 2000: 255-265.
    [11]
    Zhu S, Setia S, Jajodia S. LEAP: Efficient security mechanisms for large-scale distributed sensor networks[C]// Proceedings of the 10th ACM Conference on Computer and Communications Security. Washington, USA: ACM Press, 2003: 62-72.
    [12]
    Lee S B, Choi Y H. A resilient packet-forwarding scheme against maliciously packet-dropping nodes in sensor networks[C]// Proceedings of the 4th ACM Workshop on Security of Ad Hoc and Sensor Networks. Alexandria, USA: ACM Press, 2006: 59-70.
  • 加载中

Catalog

    [1]
    崔莉, 鞠海玲, 苗勇, 等. 无线传感器网络研究进展[J].计算机研究与发展, 2005, 42(1): 163-174.
    [2]
    Perrig A, Stankovic J, Wagner D. Security in wireless sensor networks[J]. Communications of the ACM, 2004, 47(6): 53-57.
    [3]
    Ye F, Luo H, Lu S, Zhang L. Statistical en-route filtering of injected false data in sensor networks[J]. IEEE Journal on Selected Areas in Communication, 2005, 23(4): 839-850.
    [4]
    Zhu S, Setia S, Jajodia S, et al. An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks[C]// Proceedings of the 25th IEEE Symposium on Security and Privacy. Washington, USA: IEEE Press, 2004: 259-271.
    [5]
    Ma M. Resilience of sink filtering scheme in wireless sensor networks[J]. Computer Communications, 2006, 30(1): 55-65.
    [6]
    Yuan T, Zhang S Y, Zhong Y P, et al. KAEF:An en-route scheme of filtering false data in wireless sensor networks[C]// IEEE International Performance Computing and Communications Conference. Austin, USA: IEEE Press, 2008: 193-200.
    [7]
    Yu Z, Guan Y. A dynamic en-route scheme for filtering false data[C]// Proceedings of the 3rd ACM International conference on Embedded Networked Sensor Systems. Barcelona, Spain: ACM Press, 2005: 294-295.
    [8]
    Yang H, Ye F, Yuan Y, et al. Toward resilient security in wireless sensor networks[C]// Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing. Urbana-Champaign, USA: ACM Press, 2005: 34-45.
    [9]
    Yu L,Li J Z. Grouping-based resilient statistical en-route filtering for sensor networks[C]// Proceedings of 28th International Conference on Computer and Communications, Joint Conference of the IEEE Computer and Communications Societies. Rio de Janeiro, Brazil: IEEE Press, 2009: 1 782-1 790.
    [10]
    Marti S, Giuli T, Lai K, et al. Mitigating Routing Misbehavior in Mobile Ad Hoc Networks[C]// Proceedings of the 6th Annual International Conference on Mobile Computing and Networking. Boston, USA: ACM Press, 2000: 255-265.
    [11]
    Zhu S, Setia S, Jajodia S. LEAP: Efficient security mechanisms for large-scale distributed sensor networks[C]// Proceedings of the 10th ACM Conference on Computer and Communications Security. Washington, USA: ACM Press, 2003: 62-72.
    [12]
    Lee S B, Choi Y H. A resilient packet-forwarding scheme against maliciously packet-dropping nodes in sensor networks[C]// Proceedings of the 4th ACM Workshop on Security of Ad Hoc and Sensor Networks. Alexandria, USA: ACM Press, 2006: 59-70.

    Article Metrics

    Article views (30) PDF downloads(63)
    Proportional views

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return