A partial key pre-distribution based en-route filtering scheme for wireless sensor networks


Compromised sensor nodes can be used to inject false reports (bogus reports) in wireless ssensor networks (WSNs). This can cause the sink to take wrong decisions. En-route filtering is a method to detect and filter false reports from WSNs. Most of the existing en-route filtering schemes use probabilistic approaches to filter false reports from the network, where filtering of false reports is based on a fixed probability. Thus false reports can travel multiple hops before being dropped. In this article we seek to overcome limitations of the existing schemes and reduce the overall key storage overhead in the cluster heads. In this article we propose a combinatorial design based partial en-route filtering scheme (CD-PEFS) which filters the fabricated reports deterministically. CD-PEFS reduces the energy requirements in the network by early detection and elimination of the false reports. Adoption of combinatorial design based keys get rid of shared key discovery phase from the network. This considerably reduces the communication overhead in the network. We carried out a detailed analysis of CD-PEFS against an increasing number of compromised sensor nodes in the network. We found that our scheme performs better than existing schemes in terms of filtering efficiency while maintaining low key storage overhead in the network. Further the performance of CD-PEFS is at par with existing schemes in terms of other protocol overheads.

This is a preview of subscription content, access via your institution.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6


  1. Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E (2002) A survey on sensor networks. IEEE Commun Mag 40(8):102–114

    Article  Google Scholar 

  2. Anderson I (1990) Combinatorial designs: construction methods. Ellis Horwood, New York

    Google Scholar 

  3. Dickson LE (2003) Linear groups: with an exposition of the Galois field theory. Courier Corporation, Chelmsford

    Google Scholar 

  4. Ferng HW, Khoa NM (2017) On security of wireless sensor networks: a data authentication protocol using digital signature. Wirel Netw 23(4):1113–1131

    Article  Google Scholar 

  5. Harb H, Makhoul A, Jaoude CA (2018) En-route data filtering technique for maximizing wireless sensor network lifetime. In: 2018 14th international wireless communications & mobile computing conference (IWCMC), IEEE, pp 298–303

  6. He T, Huang C, Blum BM, Stankovic JA, Abdelzaher T (2003) Range-free localization schemes for large scale sensor networks. In: Proceedings of the 9th annual international conference on Mobile computing and networking, ACM, pp 81–95

  7. Kc GS, Keromytis AD, Prevelakis V (2003) Countering code-injection attacks with instruction-set randomization. In: Proceedings of the 10th ACM conference on computer and communications security, ACM, pp 272–280

  8. Kraub C, Schneider M, Bayarou K, Eckert C (2007) Stef: a secure ticket-based en-route filtering scheme for wireless sensor networks. In: Availability, reliability and security, (2007) ARES 2007. The second international conference on, IEEE, pp 310–317

  9. Kumar A, Pais AR (2017) En-route filtering techniques in wireless sensor networks: a survey. Wirel Personal Commun 96(1):697–739

    Article  Google Scholar 

  10. Kumar A, Pais AR (2018a) Deterministic en-route filtering of false reports: a combinatorial design based approach. IEEE Access 6:74494–74505

    Article  Google Scholar 

  11. Kumar A, Pais AR (2018b) A new combinatorial design based key pre-distribution scheme for wireless sensor networks. J Ambient Intell Human Comput 10(6):2401–2416

    Article  Google Scholar 

  12. Nam SM, Cho TH (2016) Context-aware architecture for probabilistic voting-based filtering scheme in sensor networks. IEEE Transact Mob Comput 16(10):2751–2763

    Article  Google Scholar 

  13. Patwari N, Ash JN, Kyperountas S, Hero AO, Moses RL, Correal NS (2005) Locating the nodes: cooperative localization in wireless sensor networks. IEEE Signal Process Mag 22(4):54–69

    Article  Google Scholar 

  14. Perrig A, Stankovic J, Wagner D (2004) Security in wireless sensor networks. Commun ACM 47(6):53–57

    Article  Google Scholar 

  15. Przydatek B, Song D, Perrig A (2003) Sia: Secure information aggregation in sensor networks. In: Proceedings of the 1st international conference on embedded networked sensor systems, ACM, pp 255–265

  16. Ren K, Lou W, Zhang Y (2008) Leds: providing location-aware end-to-end data security in wireless sensor networks. IEEE Transact Mob Comput 7(5):585–598

    Article  Google Scholar 

  17. Ruj S, Roy B (2010) Key predistribution using combinatorial designs for grid-group deployment scheme in wireless sensor networks. ACM Transact Sens Netw (TOSN) 6(1):1–28

    Google Scholar 

  18. Shamir A (1979) How to share a secret. Commun ACM 22(11):612–613

    MathSciNet  Article  Google Scholar 

  19. Stinson DR (2007) Combinatorial designs: constructions and analysis. Springer, Berlin/Heidelberg

    Google Scholar 

  20. Xing K, Cheng X (2010) From time domain to space domain: detecting replica attacks in mobile ad hoc networks. In: INFOCOM, 2010 Proceedings IEEE, IEEE, pp 1–9

  21. Yang H, Lu S (2004) Commutative cipher based en-route filtering in wireless sensor networks. In: Vehicular technology conference, 2004. VTC2004-Fall. 2004 IEEE 60th, IEEE, vol 2, pp 1223–1227

  22. Yang H, Ye F, Yuan Y, Lu S, Arbaugh W (2005) Toward resilient security in wireless sensor networks. In: Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing, ACM, pp 34–45

  23. Yang X, Lin J, Yu W, Moulema PM, Fu X, Zhao W (2015) A novel en-route filtering scheme against false data injection attacks in cyber-physical networked systems. IEEE Transact Comput 64(1):4–18

    MathSciNet  Article  Google Scholar 

  24. Ye F, Luo H, Lu S, Zhang L (2005a) Statistical en-route filtering of injected false data in sensor networks. IEEE J Sel Areas Commun 23(4):839–850

    Article  Google Scholar 

  25. Ye F, Zhong G, Lu S, Zhang L (2005b) Gradient broadcast: a robust data delivery protocol for large scale sensor networks. Wirel Netw 11(3):285–298

    Article  Google Scholar 

  26. Yu L, Li J (2009) Grouping-based resilient statistical en-route filtering for sensor networks. In: INFOCOM 2009. IEEE, IEEE, pp 1782–1790

  27. Zhu S, Setia S, Jajodia S, Ning P (2004) An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks. Security and privacy, 2004. In: Proceedings 2004 IEEE symposium on, IEEE, pp 259–271

Download references

Author information



Corresponding author

Correspondence to Alok Kumar.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Kumar, A., Bansal, N. & Pais, A.R. A partial key pre-distribution based en-route filtering scheme for wireless sensor networks. J Ambient Intell Human Comput 12, 1471–1486 (2021). https://doi.org/10.1007/s12652-020-02216-3

Download citation


  • Combinatorial design
  • En-route filtering
  • Data authentication
  • Wireless sensor networks (WSNs)