Abstract
Compromised nodes can send a lot of forged reports to the sink node which is call false data injection (FDI). Meanwhile, sensor networks are heavily constrained in terms of energy, computational capabilities, etc. Therefore, FDI is severe threat to wireless sensor networks. Traditional mechanisms defeating FDI include en-route filtering and traceback based on probabilistic packet marking method. In this paper, we propose a balanced mechanism against FDI based on marking method and log recording. Forwarding nodes decide whether to mark the packet or log the marking field of the packet. If a forwarding node logs a packet, it deletes all previous marking information. When the sink node finds out that FDI occurs, it will launch traceback scheme. The sink can locate logging nodes according to the marking information and locate previous logging nodes by looking for records stored. We evaluate our design through analysis and simulations. The results show that the mechanism is well-balanced between marking overhead and logging overhead.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Perrig, A., Stankovic, J., Wagner, D.: Security in wireless sensor networks. Communications of the ACM 47, 53–57 (2004)
Ye, F., Luo, H., Lu, S., Zhang, L.: Statistical en-route filtering of injected false data in sensor networks. IEEE Journal on Selected Areas in Communication 23, 839–850 (2005)
Zhu, S., Jajodia, S., Ning, P.: An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks. In: IEEE Symposium on Security and Privacy, pp. 259–271 (2004)
Yu, Z., Guan, Y.: A dynamic scheme for en-route filtering false data. In: ACM International Conference on Embedded Networked Sensor Systems, pp. 294–295 (2005)
Ren, K., Lou, W., Zhang, Y.: LEDS: Providing location-aware end-to-end data security in wireless sensor networks. In: IEEE INFOCOM, pp. 585–598 (2006)
Yang, H., Ye, F., Yuan, Y., Lu, S., Arbaugh, W.: Toward resilient security in wireless sensor networks. In: IEEE MobiHoc, pp. 34–45 (2005)
Yu, L., Li, J.: Grouping-based resilient statistical en-route filtering for sensor networks. In: IEEE INFOCOM, pp. 1782–1790 (2009)
Garber, L.: Denial-of-service attacks rip the internet. Computer 33, 12–17 (2000)
Burch, H., Cheswick, B.: Tracing anonymous packets to their approximate source. In: USENIX Systems Administration Conference, pp. 319–327 (2000)
Sager, G.: Security fun with OCxmon and cflowd, http://www.caida.org/funding/ngi//content/security/1198/mt0000.htm
Song, D., Perrig, A.: Advanced and authenticated marking schemes for IP traceback. In: IEEE Infocom., vol. 2, pp. 878–886 (2001)
Bloom, B.H.: Space/time trade-offs in hash coding with allowable errors. Communications of the ACM 13, 422–426 (1970)
Ye, F., Yang, H., Liu, Z.: Catching ‘moles’ in sensor networks. In: IEEE International Conference on Distributed Computing Systems (ICDCS), pp. 69–77 (2007)
Yang, F., Zhou, X.-H., Zhang, Q.-Y., Xie, J., Zhang, S.-G.: A Practical Traceback Mechanism in Wireless Sensor Networks. Acta Electronica Sinica 37(1), 202–206 (2009)
Zhang, Q., Zhou, X., Yang, F., Li, X.: Contact-based Traceback in Wireless Sensor Networks. In: The 3rd IEEE International Conference on Wireless Communications, Networking and Mobile Computing, Shanghai, China, pp. 2487–2490 (2007)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag GmbH Berlin Heidelberg
About this paper
Cite this paper
Zhang, S., Yang, F. (2012). A Balanced Mechanism against False Data Injection in Sensor Networks. In: Zhang, Y. (eds) Future Wireless Networks and Information Systems. Lecture Notes in Electrical Engineering, vol 143. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27323-0_10
Download citation
DOI: https://doi.org/10.1007/978-3-642-27323-0_10
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-27322-3
Online ISBN: 978-3-642-27323-0
eBook Packages: EngineeringEngineering (R0)