Skip to main content

Design and Development of an Enhanced Security Scheme Using RSA for Preventing False Data Injection in Wireless Sensor Networks

  • Conference paper
  • First Online:
Ambient Communications and Computer Systems

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 696))

Abstract

Wireless sensor networks are largely used in mission-critical applications such as border surveillance, intrusion detection, remote patient monitoring. These applications demand the data to be secured while processing as well as communicating. Data security during the processing phase is a largely researched area, and there exists enough number of techniques to achieve it. On the other hand, techniques to achieve data security during communication phase even though exist in multiple numbers, most of the techniques demand high processing capacity. This requirement leads to high energy consumption which is a challenge in the context of wireless sensor networks. So a technique which will provide data security during communication phase in a wireless sensor network-based application with minimal energy consumption will be a very good solution. The proposed scheme is to prevent false data injection in which malicious or compromised nodes inject false data into the WSN which will influence the decision making of the system. The proposed system provides an enhanced security scheme for preventing false data injection attack in WSN with an efficient reactive routing method. The proposed system addresses two parameters: authenticity of the nodes and the integrity of the data. The proposed system is simulated using Network Simulator 2 (NS2), and the results indicate that the scheme performs better than the existing schemes which provide either integrity of data or authentication of the sender.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. http://en.wikipedia.org/wiki/Sensor_node.

  2. Hong Zhong, Lili Shao and Jie Cui, “A Lightweight and Secure Data Authentication Scheme with Privacy Preservation in WSN”, 2016 International Conference on Networking and Network Applications, 2016.

    Google Scholar 

  3. Swati Kasar, D.G. Khairnar and Manish Sharma, “An Energy Saving Routing Mechanism for Intrusion Prevention in Wireless Sensor Networks”, International Research Journal of Engineering and Technology, Vol. 2, Issue 4, pp. 276–281, July 2015.

    Google Scholar 

  4. Rongxing Lu, Xiaodong Lin, “BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks”, IEEE transactions on Parallel and Distributed Systems, Vol. 23, No. 1, January 2012.

    Google Scholar 

  5. H. Yang, F. Ye, Y. Yuan, S. Lu, and W. Arbaugh, “Toward Resilient Security in Wireless SensorNetworks”, Proceedings of the Sixth ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc ’05), pp. 34–45, 2005.

    Google Scholar 

  6. K. Ren, W. Lou, and Y. Zhang, “LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks”, Proceedings of the IEEE INFOCOM ’06, April 2006.

    Google Scholar 

  7. Y. Zhang, W. Liu, W. Lou, and Y. Fang, “Location-Based Compromise-Tolerant Security Mechanisms for Wireless Sensor Networks”, IEEE Journal on Selected Areas in Communication, Vol. 24, No. 2, pp. 247–260, February 2006.

    Google Scholar 

  8. L. Zhou and C. Ravishankar, “A Fault Localized Scheme for False Report Filtering in Sensor Networks”, Proceedings of the International Conference on Pervasive Services, (ICPS ’05), pp. 59–68, July 2005.

    Google Scholar 

  9. K. Jun Choi, J-I. Song, “Investigation of feasible cryptographic algorithms for wireless sensor network”, 8th International Conference on Advanced Communication Technology (ICACT 2006), February 2006.

    Google Scholar 

  10. F. Ye, H. Luo, S. Lu, and L. Zhang, “Statistical En-Route Detection and Filtering of Injected False Data in Sensor Networks”, Proceedings of the IEEE INFOCOM ’04, March 2004.

    Google Scholar 

  11. Bager Zarei, Mohammad Zeynali and Vahid Majid Nezhad, “Novel Cluster Based Routing Protocol in Wireless Sensor Networks”, International Journal of Computer Science Issues, Vol. 7, Issue 4, No. 1, July 2010.

    Google Scholar 

  12. Meenakshi Diwakar and Sushil Kumar, “An energy efficient level based clustering routing protocols for wireless sensor networks”, International Journal of Advanced Smart Sensor Network Systems, Vol. 2, No. 2, April 2012.

    Google Scholar 

  13. Qing Bian, Yan Zhang, Yanjuan Zhao, “Research on Clustering Routing Algorithms in Wireless Sensor Networks”, International Journal of Computer Science and Network Security, Vol. 2, No. 5, May 2010.

    Google Scholar 

  14. Veena Janardhanan, Arun Jose, Parameshachari B.D., Muruganantham C. and H.S. DivakaraMurthy, “An Efficient Reactive Routing Security Scheme Based on RSA Algorithm for Preventing False Data Injection Attack in WSN”, International Journal of Computer Science and Telecommunications, Vol. 4, Issue 9, September 2013.

    Google Scholar 

  15. Rajesh M, Sreevidya B, “Enhanced Energy Optimized Cluster Based On Demand Routing Protocol for Wireless Sensor Networks”, International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2017.

    Google Scholar 

  16. J.h. Chang and L. Tassiulas, “Maximum lifetime routing in wireless sensor networks”, IEEE/ACM Transactions on Networking, Vol, 12, pp. 609–619, Aug. 2004.

    Google Scholar 

  17. J. Liu, F. Zhao, and D. Petrovic, “Information-directed routing in ad hoc sensor networks”, IEEE Journal on Selected Areas of Communications, Vol. 23, pp. 851–861, Apr 2005.

    Google Scholar 

  18. Kemal Akkaya, Mohamed Younis, “A survey on routing protocols for wireless sensor networks”, Elsevier Publications on Networking, 2003.

    Google Scholar 

  19. Huang Lu, Jie Li, Guojun Wang, “A Novel Energy Efficient Routing Algorithm for Hierarchically Clustered Wireless Sensor Networks.” International Conference on Wireless Networks, 2009.

    Google Scholar 

  20. Rajesh M., Vanishree K., Sudarshan T.S.B., “Stable Route AODV Routing Protocol for Mobile Wireless Sensor Networks”, International Conference on Computing and Network Communications (CoCoNet 2015), December 2015.

    Google Scholar 

  21. M. Sakthivel, Dr. V. Palanisamy, “Performance Enhancement by an Energy Adept PE AODV with Link Failure Prediction”, Journal of Theoretical and Applied Information Technology, Vol. 61 No.3, 31 March, 2014.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to B. Sreevidya or M. Rajesh .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sreevidya, B., Rajesh, M., Mamatha, T.M. (2018). Design and Development of an Enhanced Security Scheme Using RSA for Preventing False Data Injection in Wireless Sensor Networks. In: Perez, G., Tiwari, S., Trivedi, M., Mishra, K. (eds) Ambient Communications and Computer Systems. Advances in Intelligent Systems and Computing, vol 696. Springer, Singapore. https://doi.org/10.1007/978-981-10-7386-1_20

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-7386-1_20

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-7385-4

  • Online ISBN: 978-981-10-7386-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics