Compromised sensor nodes can be used to inject false reports (bogus reports) in wireless ssensor networks (WSNs). This can cause the sink to take wrong decisions. En-route filtering is a method to detect and filter false reports from WSNs. Most of the existing en-route filtering schemes use probabilistic approaches to filter false reports from the network, where filtering of false reports is based on a fixed probability. Thus false reports can travel multiple hops before being dropped. In this article we seek to overcome limitations of the existing schemes and reduce the overall key storage overhead in the cluster heads. In this article we propose a combinatorial design based partial en-route filtering scheme (CD-PEFS) which filters the fabricated reports deterministically. CD-PEFS reduces the energy requirements in the network by early detection and elimination of the false reports. Adoption of combinatorial design based keys get rid of shared key discovery phase from the network. This considerably reduces the communication overhead in the network. We carried out a detailed analysis of CD-PEFS against an increasing number of compromised sensor nodes in the network. We found that our scheme performs better than existing schemes in terms of filtering efficiency while maintaining low key storage overhead in the network. Further the performance of CD-PEFS is at par with existing schemes in terms of other protocol overheads.
This is a preview of subscription content, access via your institution.
Buy single article
Instant access to the full article PDF.
Tax calculation will be finalised during checkout.
Subscribe to journal
Immediate online access to all issues from 2019. Subscription will auto renew annually.
Tax calculation will be finalised during checkout.
Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E (2002) A survey on sensor networks. IEEE Commun Mag 40(8):102–114
Anderson I (1990) Combinatorial designs: construction methods. Ellis Horwood, New York
Dickson LE (2003) Linear groups: with an exposition of the Galois field theory. Courier Corporation, Chelmsford
Ferng HW, Khoa NM (2017) On security of wireless sensor networks: a data authentication protocol using digital signature. Wirel Netw 23(4):1113–1131
Harb H, Makhoul A, Jaoude CA (2018) En-route data filtering technique for maximizing wireless sensor network lifetime. In: 2018 14th international wireless communications & mobile computing conference (IWCMC), IEEE, pp 298–303
He T, Huang C, Blum BM, Stankovic JA, Abdelzaher T (2003) Range-free localization schemes for large scale sensor networks. In: Proceedings of the 9th annual international conference on Mobile computing and networking, ACM, pp 81–95
Kc GS, Keromytis AD, Prevelakis V (2003) Countering code-injection attacks with instruction-set randomization. In: Proceedings of the 10th ACM conference on computer and communications security, ACM, pp 272–280
Kraub C, Schneider M, Bayarou K, Eckert C (2007) Stef: a secure ticket-based en-route filtering scheme for wireless sensor networks. In: Availability, reliability and security, (2007) ARES 2007. The second international conference on, IEEE, pp 310–317
Kumar A, Pais AR (2017) En-route filtering techniques in wireless sensor networks: a survey. Wirel Personal Commun 96(1):697–739
Kumar A, Pais AR (2018a) Deterministic en-route filtering of false reports: a combinatorial design based approach. IEEE Access 6:74494–74505
Kumar A, Pais AR (2018b) A new combinatorial design based key pre-distribution scheme for wireless sensor networks. J Ambient Intell Human Comput 10(6):2401–2416
Nam SM, Cho TH (2016) Context-aware architecture for probabilistic voting-based filtering scheme in sensor networks. IEEE Transact Mob Comput 16(10):2751–2763
Patwari N, Ash JN, Kyperountas S, Hero AO, Moses RL, Correal NS (2005) Locating the nodes: cooperative localization in wireless sensor networks. IEEE Signal Process Mag 22(4):54–69
Perrig A, Stankovic J, Wagner D (2004) Security in wireless sensor networks. Commun ACM 47(6):53–57
Przydatek B, Song D, Perrig A (2003) Sia: Secure information aggregation in sensor networks. In: Proceedings of the 1st international conference on embedded networked sensor systems, ACM, pp 255–265
Ren K, Lou W, Zhang Y (2008) Leds: providing location-aware end-to-end data security in wireless sensor networks. IEEE Transact Mob Comput 7(5):585–598
Ruj S, Roy B (2010) Key predistribution using combinatorial designs for grid-group deployment scheme in wireless sensor networks. ACM Transact Sens Netw (TOSN) 6(1):1–28
Shamir A (1979) How to share a secret. Commun ACM 22(11):612–613
Stinson DR (2007) Combinatorial designs: constructions and analysis. Springer, Berlin/Heidelberg
Xing K, Cheng X (2010) From time domain to space domain: detecting replica attacks in mobile ad hoc networks. In: INFOCOM, 2010 Proceedings IEEE, IEEE, pp 1–9
Yang H, Lu S (2004) Commutative cipher based en-route filtering in wireless sensor networks. In: Vehicular technology conference, 2004. VTC2004-Fall. 2004 IEEE 60th, IEEE, vol 2, pp 1223–1227
Yang H, Ye F, Yuan Y, Lu S, Arbaugh W (2005) Toward resilient security in wireless sensor networks. In: Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing, ACM, pp 34–45
Yang X, Lin J, Yu W, Moulema PM, Fu X, Zhao W (2015) A novel en-route filtering scheme against false data injection attacks in cyber-physical networked systems. IEEE Transact Comput 64(1):4–18
Ye F, Luo H, Lu S, Zhang L (2005a) Statistical en-route filtering of injected false data in sensor networks. IEEE J Sel Areas Commun 23(4):839–850
Ye F, Zhong G, Lu S, Zhang L (2005b) Gradient broadcast: a robust data delivery protocol for large scale sensor networks. Wirel Netw 11(3):285–298
Yu L, Li J (2009) Grouping-based resilient statistical en-route filtering for sensor networks. In: INFOCOM 2009. IEEE, IEEE, pp 1782–1790
Zhu S, Setia S, Jajodia S, Ning P (2004) An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks. Security and privacy, 2004. In: Proceedings 2004 IEEE symposium on, IEEE, pp 259–271
Conflict of interest
The authors declare that they have no conflict of interest.
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
About this article
Cite this article
Kumar, A., Bansal, N. & Pais, A.R. A partial key pre-distribution based en-route filtering scheme for wireless sensor networks. J Ambient Intell Human Comput 12, 1471–1486 (2021). https://doi.org/10.1007/s12652-020-02216-3
- Combinatorial design
- En-route filtering
- Data authentication
- Wireless sensor networks (WSNs)