Abstract
Wireless sensor networks are largely used in mission-critical applications such as border surveillance, intrusion detection, remote patient monitoring. These applications demand the data to be secured while processing as well as communicating. Data security during the processing phase is a largely researched area, and there exists enough number of techniques to achieve it. On the other hand, techniques to achieve data security during communication phase even though exist in multiple numbers, most of the techniques demand high processing capacity. This requirement leads to high energy consumption which is a challenge in the context of wireless sensor networks. So a technique which will provide data security during communication phase in a wireless sensor network-based application with minimal energy consumption will be a very good solution. The proposed scheme is to prevent false data injection in which malicious or compromised nodes inject false data into the WSN which will influence the decision making of the system. The proposed system provides an enhanced security scheme for preventing false data injection attack in WSN with an efficient reactive routing method. The proposed system addresses two parameters: authenticity of the nodes and the integrity of the data. The proposed system is simulated using Network Simulator 2 (NS2), and the results indicate that the scheme performs better than the existing schemes which provide either integrity of data or authentication of the sender.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Hong Zhong, Lili Shao and Jie Cui, “A Lightweight and Secure Data Authentication Scheme with Privacy Preservation in WSN”, 2016 International Conference on Networking and Network Applications, 2016.
Swati Kasar, D.G. Khairnar and Manish Sharma, “An Energy Saving Routing Mechanism for Intrusion Prevention in Wireless Sensor Networks”, International Research Journal of Engineering and Technology, Vol. 2, Issue 4, pp. 276–281, July 2015.
Rongxing Lu, Xiaodong Lin, “BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks”, IEEE transactions on Parallel and Distributed Systems, Vol. 23, No. 1, January 2012.
H. Yang, F. Ye, Y. Yuan, S. Lu, and W. Arbaugh, “Toward Resilient Security in Wireless SensorNetworks”, Proceedings of the Sixth ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc ’05), pp. 34–45, 2005.
K. Ren, W. Lou, and Y. Zhang, “LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks”, Proceedings of the IEEE INFOCOM ’06, April 2006.
Y. Zhang, W. Liu, W. Lou, and Y. Fang, “Location-Based Compromise-Tolerant Security Mechanisms for Wireless Sensor Networks”, IEEE Journal on Selected Areas in Communication, Vol. 24, No. 2, pp. 247–260, February 2006.
L. Zhou and C. Ravishankar, “A Fault Localized Scheme for False Report Filtering in Sensor Networks”, Proceedings of the International Conference on Pervasive Services, (ICPS ’05), pp. 59–68, July 2005.
K. Jun Choi, J-I. Song, “Investigation of feasible cryptographic algorithms for wireless sensor network”, 8th International Conference on Advanced Communication Technology (ICACT 2006), February 2006.
F. Ye, H. Luo, S. Lu, and L. Zhang, “Statistical En-Route Detection and Filtering of Injected False Data in Sensor Networks”, Proceedings of the IEEE INFOCOM ’04, March 2004.
Bager Zarei, Mohammad Zeynali and Vahid Majid Nezhad, “Novel Cluster Based Routing Protocol in Wireless Sensor Networks”, International Journal of Computer Science Issues, Vol. 7, Issue 4, No. 1, July 2010.
Meenakshi Diwakar and Sushil Kumar, “An energy efficient level based clustering routing protocols for wireless sensor networks”, International Journal of Advanced Smart Sensor Network Systems, Vol. 2, No. 2, April 2012.
Qing Bian, Yan Zhang, Yanjuan Zhao, “Research on Clustering Routing Algorithms in Wireless Sensor Networks”, International Journal of Computer Science and Network Security, Vol. 2, No. 5, May 2010.
Veena Janardhanan, Arun Jose, Parameshachari B.D., Muruganantham C. and H.S. DivakaraMurthy, “An Efficient Reactive Routing Security Scheme Based on RSA Algorithm for Preventing False Data Injection Attack in WSN”, International Journal of Computer Science and Telecommunications, Vol. 4, Issue 9, September 2013.
Rajesh M, Sreevidya B, “Enhanced Energy Optimized Cluster Based On Demand Routing Protocol for Wireless Sensor Networks”, International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2017.
J.h. Chang and L. Tassiulas, “Maximum lifetime routing in wireless sensor networks”, IEEE/ACM Transactions on Networking, Vol, 12, pp. 609–619, Aug. 2004.
J. Liu, F. Zhao, and D. Petrovic, “Information-directed routing in ad hoc sensor networks”, IEEE Journal on Selected Areas of Communications, Vol. 23, pp. 851–861, Apr 2005.
Kemal Akkaya, Mohamed Younis, “A survey on routing protocols for wireless sensor networks”, Elsevier Publications on Networking, 2003.
Huang Lu, Jie Li, Guojun Wang, “A Novel Energy Efficient Routing Algorithm for Hierarchically Clustered Wireless Sensor Networks.” International Conference on Wireless Networks, 2009.
Rajesh M., Vanishree K., Sudarshan T.S.B., “Stable Route AODV Routing Protocol for Mobile Wireless Sensor Networks”, International Conference on Computing and Network Communications (CoCoNet 2015), December 2015.
M. Sakthivel, Dr. V. Palanisamy, “Performance Enhancement by an Energy Adept PE AODV with Link Failure Prediction”, Journal of Theoretical and Applied Information Technology, Vol. 61 No.3, 31 March, 2014.
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Sreevidya, B., Rajesh, M., Mamatha, T.M. (2018). Design and Development of an Enhanced Security Scheme Using RSA for Preventing False Data Injection in Wireless Sensor Networks. In: Perez, G., Tiwari, S., Trivedi, M., Mishra, K. (eds) Ambient Communications and Computer Systems. Advances in Intelligent Systems and Computing, vol 696. Springer, Singapore. https://doi.org/10.1007/978-981-10-7386-1_20
Download citation
DOI: https://doi.org/10.1007/978-981-10-7386-1_20
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-7385-4
Online ISBN: 978-981-10-7386-1
eBook Packages: EngineeringEngineering (R0)