False Data Elimination in Heterogeneous Wireless Sensor Networks Using Location-Based Selection of Aggregator Nodes

ABSTRACT The false data injected by the compromised sensor nodes in heterogeneous wireless sensor networks are not only a threat to data integrity but also consume bandwidth and power unnecessarily. The existing mechanisms for eliminating the injected false data are carried out with a fixed set of aggregator nodes. This causes battery drain at the aggregator nodes, leading to reduced network lifetime. Hence, it is necessary to reduce the battery drain by changing the aggregator nodes at regular intervals. The periodic change of aggregator nodes introduces the problem of pair-wise key establishment among the sensor nodes. This paper aims at eliminating the injected false data in heterogeneous wireless sensor networks. It also addresses the issue of battery drain at the aggregator nodes by periodically selecting the aggregator nodes based on location, exploiting the heterogeneity of the sensor nodes in the network. The problem of pair-wise key establishment is resolved by using a suitably modified cryptographic scheme based on Jacobian elliptic Chebyshev rational map. This modification is due to the fact that the original scheme is easily breakable.

[1]  Wei Zhang,et al.  Deploying a Heterogeneous Wireless Sensor Network , 2007, 2007 International Conference on Wireless Communications, Networking and Mobile Computing.

[2]  Frederik Armknecht,et al.  Non-Manipulable Aggregator Node Election Protocols for Wireless Sensor Networks , 2007, 2007 5th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks and Workshops.

[3]  Vijay Varadharajan,et al.  Wireless sensor network key management survey and taxonomy , 2010, J. Netw. Comput. Appl..

[4]  Dominic O'Brien,et al.  Hybrid Radio and Optical Communications for Energy-efficient Wireless Sensor Networks , 2011 .

[5]  Dawn Xiaodong Song,et al.  SIA: secure information aggregation in sensor networks , 2003, SenSys '03.

[6]  Yang Xiao,et al.  Secure data aggregation without persistent cryptographic operations in wireless sensor networks , 2006, 2006 IEEE International Performance Computing and Communications Conference.

[7]  Sushil Jajodia,et al.  Interleaved hop-by-hop authentication against false data injection attacks in sensor networks , 2007, TOSN.

[8]  Levente Buttyán,et al.  PANEL: Position-based Aggregator Node Election in Wireless Sensor Networks , 2007, 2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems.

[9]  Tohru Kohda,et al.  Jacobian elliptic Chebyshev rational maps , 2001 .

[10]  Yunghsiang Sam Han,et al.  A witness-based approach for data fusion assurance in wireless sensor networks , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).

[11]  Songwu Lu,et al.  Commutative cipher based en-route filtering in wireless sensor networks , 2004, IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004.

[12]  Wendi Heinzelman,et al.  Energy-efficient communication protocol for wireless microsensor networks , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.

[13]  Sencun Zhu,et al.  SDAP: a secure hop-by-Hop data aggregation protocol for sensor networks , 2006, MobiHoc '06.

[14]  Haiyun Luo,et al.  Statistical En-route Detection and Filtering of Injected False Data in Sensor Networks , 2004, INFOCOM 2004.

[15]  Hasan Çam,et al.  Integration of False Data Detection With Data Aggregation and Confidential Transmission in Wireless Sensor Networks , 2010, IEEE/ACM Transactions on Networking.