A Double Key-Sharing Based False Data Filtering Scheme in Wireless Sensor Networks

In wireless sensor networks, the attackers can inject false data reports containing bogus readings or non-existent events from compromising nodes, which may result in false alarms, interfere decision making, and drain out the limited energy of the network. Existing approaches to filter false reports, notably statistical en-route filtering, share keys between the nodes in low probabilities, and rely on the forwarding nodes to verify the correctness of the MACs (Message Authentication Codes) carried in each report. As a result, false reports have to travel multiple hops before being detected and filtered, and thus lead to the waste of energy of the network. A Double key-Sharing based false data Filtering scheme (DSF) in this paper is proposed to cope with this problem, in which nodes are grouped into clusters and each cluster head establishes relationship with the nodes closer through pair wise keys to form a blocked region. Furthermore, each pair of nodes shares symmetric keys randomly. When an event occurs, a legitimate report must carry two types of MACs. In filtering phase, each forwarding node validates not only the correctness of these two types of MACs carried in the report, but also drops part of the tail of the reports just outside the blocked region. Extensive analyses and simulations show that DSF outperforms existing schemes in terms of filtering efficiency and energy consumption.

[1]  Guohong Cao,et al.  Group rekeying for filtering false data in sensor networks: a predistribution and local collaboration-based approach , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[2]  Ivan Stojmenovic,et al.  Routing with Guaranteed Delivery in Ad Hoc Wireless Networks , 1999, DIALM '99.

[3]  Burton H. Bloom,et al.  Space/time trade-offs in hash coding with allowable errors , 1970, CACM.

[4]  Yuguang Fang,et al.  SPREAD: enhancing data confidentiality in mobile ad hoc networks , 2004, IEEE INFOCOM 2004.

[5]  Yong Guan,et al.  A Dynamic En-Route Scheme for Filtering False Data Injection in Wireless Sensor Networks , 2005, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[6]  Qun Li,et al.  Efficient Implementation of Public Key Cryptosystems on Mote Sensors (Short Paper) , 2006, ICICS.

[7]  Joonsang Baek,et al.  Identity-based threshold signature scheme from the bilinear pairings (extended abstract) , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..

[8]  J. Baek,et al.  Identity-based Threshold Signature from the Bilinear Pairings , 2004 .

[9]  Michael D. Smith,et al.  A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..

[10]  Michael Szydlo,et al.  Merkle Tree Traversal in Log Space and Time , 2004, EUROCRYPT.

[11]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[12]  Shanshan Li,et al.  Estimation of a Population Size in Large-Scale Wireless Sensor Networks , 2009, Journal of Computer Science and Technology.

[13]  Peter Kruus,et al.  TinyPK: securing sensor networks with public key technology , 2004, SASN '04.

[14]  Qun Li,et al.  PDF: A Public-key based False Data Filtering Scheme in Sensor Networks , 2007, International Conference on Wireless Algorithms, Systems and Applications (WASA 2007).

[15]  Su Zhong,et al.  Key Management Schemes and Protocols for Wireless Sensor Networks , 2007 .

[16]  Thomas F. La Porta,et al.  Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks , 2006, IEEE Transactions on Mobile Computing.

[17]  Ian F. Akyildiz,et al.  Wireless sensor networks , 2007 .

[18]  David E. Culler,et al.  SPINS: Security Protocols for Sensor Networks , 2001, MobiCom '01.

[19]  Donggang Liu,et al.  Location-based pairwise key establishments for static sensor networks , 2003, SASN '03.

[20]  Haiyun Luo,et al.  Statistical en-route filtering of injected false data in sensor networks , 2004, IEEE INFOCOM 2004.

[21]  Sushil Jajodia,et al.  An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[22]  Davide Brunelli,et al.  Wireless Sensor Networks , 2012, Lecture Notes in Computer Science.

[23]  Miao Ma Resilience of sink filtering scheme in wireless sensor networks , 2006, Comput. Commun..

[24]  Donggang Liu,et al.  Establishing pairwise keys in distributed sensor networks , 2005, TSEC.

[25]  Brian D. O. Anderson,et al.  Wireless sensor network localization techniques , 2007, Comput. Networks.

[26]  Ming-Whei Feng Wireless Sensor Network Industrial View? What Will Be the Killer Apps for Wireless Sensor Network? , 2008, 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (sutc 2008).

[27]  Jianzhong Li,et al.  Grouping-Based Resilient Statistical En-Route Filtering for Sensor Networks , 2009, IEEE INFOCOM 2009.

[28]  Wenjing Lou,et al.  LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks , 2008, IEEE Trans. Mob. Comput..

[29]  Tracey Ho,et al.  Resilient network coding in the presence of Byzantine adversaries , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[30]  S. Manesis,et al.  A Survey of Applications of Wireless Sensors and Wireless Sensor Networks , 2005, Proceedings of the 2005 IEEE International Symposium on, Mediterrean Conference on Control and Automation Intelligent Control, 2005..

[31]  Songwu Lu,et al.  Commutative cipher based en-route filtering in wireless sensor networks , 2004, IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004.

[32]  Erman Ayday,et al.  Location-Aware Security Services for Wireless Sensor Networks Using Network Coding , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.