A Stream-Data Oriented Secure Routing Protocol in Wireless Sensor Networks

As the WSN multi-media applications go deep into the military, monitor and other data-sensitive areas, stream data have become the main data processing objects instead of scalar data in WMSN. Because of the difference between the application environments and data features of stream data and scalar data, traditional secure routing for scalar data is not fit for stream data. In this paper, SOAR, a secure route for the false data injection attack model is presented. SOAR works in the stream data transfer mode and randomly detects the false data injection attacks. SOAR guarantees that the base stations receive small percentage of false packages with rather low load.

[1]  Ross J. Anderson,et al.  Key infection: smart trust for smart dust , 2004, Proceedings of the 12th IEEE International Conference on Network Protocols, 2004. ICNP 2004..

[2]  Gordon L. Stuber,et al.  Principles of Mobile Communication , 1996 .

[3]  Srdjan Capkun,et al.  ROPE: robust position estimation in wireless sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..

[4]  Deborah Estrin,et al.  Directed diffusion for wireless sensor networking , 2003, TNET.

[5]  Gordon L. Stuber,et al.  Principles of mobile communication (2nd ed.) , 2001 .

[6]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[7]  T. La Porta,et al.  On supporting distributed collaboration in sensor networks , 2003, IEEE Military Communications Conference, 2003. MILCOM 2003..

[8]  Deborah Estrin,et al.  Highly-resilient, energy-efficient multipath routing in wireless sensor networks , 2001, MOCO.

[9]  Haiyun Luo,et al.  Statistical en-route filtering of injected false data in sensor networks , 2005, IEEE J. Sel. Areas Commun..

[10]  Sushil Jajodia,et al.  An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[11]  Deborah Estrin,et al.  Geographical and Energy Aware Routing: a recursive data dissemination protocol for wireless sensor networks , 2002 .

[12]  John Stanley,et al.  Applying Video Sensor Networks to Nearshore Environment Monitoring , 2003, IEEE Pervasive Comput..

[13]  Peidong Zhu,et al.  An Effective Secure Routing for False Data Injection Attack in Wireless Sensor Network , 2007, APNOMS.

[14]  Shivakant Mishra,et al.  INSENS: Intrusion-Tolerant Routing in Wireless Sensor Networks ; CU-CS-939-02 , 2002 .