False Data Injection Prevention in Wireless Sensor Networks using Node-level Trust Value Computation

Wireless Sensor Networks are extensively used in developing applications for surveillance, habitat monitoring, border security, intrusion detection etc. Most of these applications require secure data transmission among the nodes of the network. Out of the different types of attacks a data critical application faces, False Data Injection attacks are the most damaging one. So prevention of False Data Injection attacks is a crucial aspect while building data critical wireless sensor network applications. Researchers have suggested cryptographic schemes like RSA, ECC for the prevention of False Data Injection Attacks. Use of cryptographic techniques increases the computation complexity on all the nodes and the energy constraints on WSN demands an alternate solution for False Data Injection attacks prevention. The proposed work aims on using trust parameter of every nodes to distinguish malicious and non-malicious nodes and use only trusted nodes to forward the packet to destination thus by prevention FDI attacks. Simulation is carried out with the help of Network Simulator 2 (NS2). The results shows the energy consumption is less in the proposed scheme compared to the cryptographic techniques.

[1]  Yuguang Fang,et al.  Location-based compromise-tolerant security mechanisms for wireless sensor networks , 2006, IEEE Journal on Selected Areas in Communications.

[2]  Kyung Jun Choi,et al.  Investigation of feasible cryptographic algorithms for wireless sensor network , 2006, 2006 8th International Conference Advanced Communication Technology.

[3]  Xiaohui Liang,et al.  BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.

[4]  M.Rajesh kumar Trust-Based Malicious Node Detection and Routing in Wireless Sensor Networks , 2017 .

[5]  Jie Cui,et al.  A Lightweight and Secure Data Authentication Scheme with Privacy Preservation for Wireless Sensor Networks , 2016, 2016 International Conference on Networking and Network Applications (NaNA).

[6]  H. Cam,et al.  Energy efficient security protocol for wireless sensor networks , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).

[7]  Prashant N. Chatur,et al.  TCNPR: Trust Calculation based on Nodes Properties and Recommendations for Intrusion Detection in Wireless Sensor Network , 2017 .

[8]  M. Rajesh,et al.  Enhanced energy optimized cluster based on demand routing protocol for wireless sensor networks , 2017, 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[9]  Chinya V. Ravishankar,et al.  A fault localized scheme for false report filtering in sensor networks , 2005, ICPS '05. Proceedings. International Conference on Pervasive Services, 2005..

[10]  Haiyun Luo,et al.  Statistical En-route Detection and Filtering of Injected False Data in Sensor Networks , 2004, INFOCOM 2004.

[11]  Sushil Jajodia,et al.  An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[12]  Wenjing Lou,et al.  LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[13]  Manish Sharma,et al.  An Energy Saving Routing Mechanism for Intrusion Prevention in Wireless Sensor Networks , 2015 .

[14]  William A. Arbaugh,et al.  Toward resilient security in wireless sensor networks , 2005, MobiHoc '05.