An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks

被引:0
|
作者
Zhu, S [1 ]
Setia, S [1 ]
Jajodia, S [1 ]
Ning, P [1 ]
机构
[1] George Mason Univ, Ctr Secure Informat Syst, Fairfax, VA 22030 USA
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Sensor networks are often deployed in unattended environments, thus leaving these networks vulnerable to false data injection attacks in which an adversary injects false data into the network with the goal of deceiving the base station or depleting the resources of the relaying nodes. Standard authentication mechanisms cannot prevent this attack if the adversary has compromised one or a small number of sensor nodes. In this paper we present an interleaved hop-by-hop authentication scheme that guarantees that the base station will detect any injected false data packets when no more than a certain number t nodes are compromised. Further our scheme provides an upper bound B for the number of hops that a false data packet could be forwarded before it is detected and dropped, given that there are up to t colluding compromised nodes. We show that in the worst case B is O(t(2)). Through performance analysis, we show that our scheme is efficient with respect to the security it provides, and it also allows a tradeoff between security and performance.
引用
收藏
页码:259 / 271
页数:13
相关论文
共 50 条
  • [1] Interleaved hop-by-hop authentication against false data injection attacks in sensor networks
    Zhu, Sencun
    Setia, Sanjeev
    Jajodia, Sushil
    Ning, Peng
    ACM TRANSACTIONS ON SENSOR NETWORKS, 2007, 3 (03)
  • [2] A multi-path interleaved hop-by-hop en-route filtering scheme in wireless sensor networks
    Nghiem, Thao P.
    Cho, Tae Ho
    COMPUTER COMMUNICATIONS, 2010, 33 (10) : 1202 - 1209
  • [3] A hop-by-hop reliability support scheme for wireless sensor networks
    Lee, H
    Ko, Y
    Lee, D
    FOURTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2006, : 431 - +
  • [4] Hop-by-Hop Message Authentication and Source Privacy in Wireless Sensor Networks
    Li, Jian
    Li, Yun
    Ren, Jian
    Wu, Jie
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (05) : 1223 - 1232
  • [5] Providing Hop-by-Hop Authentication and Source Privacy in Wireless Sensor Networks
    Li, Yun
    Li, Jian
    Ren, Jian
    Wu, Jie
    2012 PROCEEDINGS IEEE INFOCOM, 2012, : 3071 - 3075
  • [6] Interleaved Hop-by-Hop Authentication using fuzzy logic to defend against of False Report Injection by Replaying an attack
    Kim, Jong Hyun
    Cho, Tae Ho
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (07): : 91 - 96
  • [7] A robust authentication scheme for filtering of injected false data in dynamic wireless sensor networks
    Hu Yupeng
    Lin Yaping
    Yu Jianping
    Zeng Weini
    Li Yeqing
    Li Xiaolong
    CHINESE JOURNAL OF ELECTRONICS, 2007, 16 (03): : 443 - 448
  • [8] Hop-by-Hop Traceback in Wireless Sensor Networks
    Siddiqui, Muhammad Shoaib
    Amin, Syed Obaid
    Hong, Choong Seon
    IEEE COMMUNICATIONS LETTERS, 2012, 16 (02) : 242 - 245
  • [9] SDAP: A secure Hop-by-hop Data Aggregation Protocol for sensor networks
    Yang, Yi
    Wang, Xinran
    Zhu, Sencun
    Cao, Guohong
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2008, 11 (04)
  • [10] Hop-by-hop Control for Reliable Data Dissemination in Wireless Sensor Networks
    Park, Hosung
    Kim, Taehee
    Lee, Jeongcheol
    Jin, Min-Sook
    Kim, Sang-Ha
    ISADS 2009: 2009 INTERNATIONAL SYMPOSIUM ON AUTONOMOUS DECENTRALIZED SYSTEMS, PROCEEDINGS, 2009, : 317 - 322