Skip to main content

A Balanced Mechanism against False Data Injection in Sensor Networks

  • Conference paper
Future Wireless Networks and Information Systems

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 143))

  • 2776 Accesses

Abstract

Compromised nodes can send a lot of forged reports to the sink node which is call false data injection (FDI). Meanwhile, sensor networks are heavily constrained in terms of energy, computational capabilities, etc. Therefore, FDI is severe threat to wireless sensor networks. Traditional mechanisms defeating FDI include en-route filtering and traceback based on probabilistic packet marking method. In this paper, we propose a balanced mechanism against FDI based on marking method and log recording. Forwarding nodes decide whether to mark the packet or log the marking field of the packet. If a forwarding node logs a packet, it deletes all previous marking information. When the sink node finds out that FDI occurs, it will launch traceback scheme. The sink can locate logging nodes according to the marking information and locate previous logging nodes by looking for records stored. We evaluate our design through analysis and simulations. The results show that the mechanism is well-balanced between marking overhead and logging overhead.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Perrig, A., Stankovic, J., Wagner, D.: Security in wireless sensor networks. Communications of the ACM 47, 53–57 (2004)

    Article  Google Scholar 

  2. Ye, F., Luo, H., Lu, S., Zhang, L.: Statistical en-route filtering of injected false data in sensor networks. IEEE Journal on Selected Areas in Communication 23, 839–850 (2005)

    Article  Google Scholar 

  3. Zhu, S., Jajodia, S., Ning, P.: An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks. In: IEEE Symposium on Security and Privacy, pp. 259–271 (2004)

    Google Scholar 

  4. Yu, Z., Guan, Y.: A dynamic scheme for en-route filtering false data. In: ACM International Conference on Embedded Networked Sensor Systems, pp. 294–295 (2005)

    Google Scholar 

  5. Ren, K., Lou, W., Zhang, Y.: LEDS: Providing location-aware end-to-end data security in wireless sensor networks. In: IEEE INFOCOM, pp. 585–598 (2006)

    Google Scholar 

  6. Yang, H., Ye, F., Yuan, Y., Lu, S., Arbaugh, W.: Toward resilient security in wireless sensor networks. In: IEEE MobiHoc, pp. 34–45 (2005)

    Google Scholar 

  7. Yu, L., Li, J.: Grouping-based resilient statistical en-route filtering for sensor networks. In: IEEE INFOCOM, pp. 1782–1790 (2009)

    Google Scholar 

  8. Garber, L.: Denial-of-service attacks rip the internet. Computer 33, 12–17 (2000)

    Article  Google Scholar 

  9. Burch, H., Cheswick, B.: Tracing anonymous packets to their approximate source. In: USENIX Systems Administration Conference, pp. 319–327 (2000)

    Google Scholar 

  10. Sager, G.: Security fun with OCxmon and cflowd, http://www.caida.org/funding/ngi//content/security/1198/mt0000.htm

  11. Song, D., Perrig, A.: Advanced and authenticated marking schemes for IP traceback. In: IEEE Infocom., vol. 2, pp. 878–886 (2001)

    Google Scholar 

  12. Bloom, B.H.: Space/time trade-offs in hash coding with allowable errors. Communications of the ACM 13, 422–426 (1970)

    Article  MATH  Google Scholar 

  13. Ye, F., Yang, H., Liu, Z.: Catching ‘moles’ in sensor networks. In: IEEE International Conference on Distributed Computing Systems (ICDCS), pp. 69–77 (2007)

    Google Scholar 

  14. Yang, F., Zhou, X.-H., Zhang, Q.-Y., Xie, J., Zhang, S.-G.: A Practical Traceback Mechanism in Wireless Sensor Networks. Acta Electronica Sinica 37(1), 202–206 (2009)

    Google Scholar 

  15. Zhang, Q., Zhou, X., Yang, F., Li, X.: Contact-based Traceback in Wireless Sensor Networks. In: The 3rd IEEE International Conference on Wireless Communications, Networking and Mobile Computing, Shanghai, China, pp. 2487–2490 (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shuguang Zhang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag GmbH Berlin Heidelberg

About this paper

Cite this paper

Zhang, S., Yang, F. (2012). A Balanced Mechanism against False Data Injection in Sensor Networks. In: Zhang, Y. (eds) Future Wireless Networks and Information Systems. Lecture Notes in Electrical Engineering, vol 143. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27323-0_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-27323-0_10

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-27322-3

  • Online ISBN: 978-3-642-27323-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics