A probabilistic voting-based filtering scheme in wireless sensor networks

In this paper, we study the fabricated report with false votes attack and the false votes on real reports attack in wireless sensor networks. Since most of the existing works addresses the first attack while leaving an easy way for the attackers to launch the second attack, we propose a probabilistic voting-based filtering scheme (PVFS) to deal with both of them simultaneously. On the basis of the en-route filtering scheme, PVFS combines cluster-based organization, probabilistic key assignment, and voting methods. Through both analysis and simulation, we demonstrate that PVFS could achieve strong protection against both attacks while maintaining a sufficiently high filtering power.

[1]  Yunghsiang Sam Han,et al.  A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.

[2]  M. Jiang,et al.  Cluster based routing protocol (CBRP) , 1999 .

[3]  Haiyun Luo,et al.  Statistical en-route filtering of injected false data in sensor networks , 2005, IEEE J. Sel. Areas Commun..

[4]  Jinyang Li,et al.  Cluster Based Routing Protocol(CBRP) Functional Specification , 1999 .

[5]  Sushil Jajodia,et al.  An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[6]  Elaine Shi,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[7]  Ran Canetti,et al.  Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[8]  Adrian Perrig,et al.  PIKE: peer intermediaries for key establishment in sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[9]  Wendi Heinzelman,et al.  Proceedings of the 33rd Hawaii International Conference on System Sciences- 2000 Energy-Efficient Communication Protocol for Wireless Microsensor Networks , 2022 .

[10]  Donggang Liu Resilient Cluster Formation for Sensor Networks , 2007, 27th International Conference on Distributed Computing Systems (ICDCS '07).

[11]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[12]  Dawn Song,et al.  SIA: Secure information aggregation in sensor networks , 2007, J. Comput. Secur..

[13]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[14]  William A. Arbaugh,et al.  Toward resilient security in wireless sensor networks , 2005, MobiHoc '05.

[15]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[16]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[17]  Yunghsiang Sam Han,et al.  A key management scheme for wireless sensor networks using deployment knowledge , 2004, IEEE INFOCOM 2004.

[18]  Ran Canetti,et al.  Efficient and Secure Source Authentication for Multicast , 2001, NDSS.

[19]  Fan Ye,et al.  Catching "Moles" in Sensor Networks , 2007, 27th International Conference on Distributed Computing Systems (ICDCS '07).

[20]  Dawn Xiaodong Song,et al.  SIA: secure information aggregation in sensor networks , 2003, SenSys '03.