Skip to main content

False Data Attacks Judgment Based on Consistency Loop Model in Wireless Sensor Networks

  • Conference paper
  • 2798 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 7929))

Abstract

Wireless sensor networks are usually deployed in complex environments; an attacker can easily inject false data by capturing nodes, causing serious consequences. The main work of this paper is as follows. Firstly, the logical loop model is created based on the estimated value of the source events of every wireless sensor network node. Secondly, each node based on RSSI find neighbor nodes by establishing consistency loop model. Finally, the malicious node is determined by comparing the similarities and differences of the nodes between the two loop models. The simulation shows that this mechanism is effective to inhibit the infringement of malicious nodes to the network, and improve network security performance.

This research was supported by the Key Technology R&D Project of Jiangsu Province (Grant No. BE2010026).

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Lindsey, S., Raghavendra, C., Sivalingam, K.M.: Data gathering a1gorithms in sensor network using energy metrics. IEEE Trans on Parallel and Distributed Systems 13(9), 924–935 (2002)

    Article  Google Scholar 

  2. Yuan, L., Qu, G.: Design Space Exploration for Energy-Efficient Secure Sensor Network. In: ASAP (2002)

    Google Scholar 

  3. Silva, A.R.D., Martins, M., Rocha, B.: Decentralized Intrusion Detection in Wireless Sensor Networks. In: Proceedings of the 1st ACM International Workshop on Quality of Service & Security in Wireless and Mobile Networks (Q2SWinet 2005), pp. 16–22 (2005)

    Google Scholar 

  4. Josang, A., Ismail, R., Boyd, C.: A Survey of Trust and Reputation Systems for Online Service Provision. Decision Support Systems, 618–644 (2007)

    Google Scholar 

  5. Hur, J., Lee, Y., Hong, S.M., Yoon, H.: Trust Management for Resilient Wireless Sensor Networks. In: Proceedings of the 8th International Conference on Information Security and Cryptology, pp. 56–68 (2005)

    Google Scholar 

  6. Vuran, M.C., Akyildiz, I.F.: Spatiotemporal correlation theory and applications for wireless sensor networks. Computer Networks Journal 45(3), 245–261 (2004)

    Article  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Li, P., Sun, L., Yang, W., Fang, Q., Xie, J., Ma, K. (2013). False Data Attacks Judgment Based on Consistency Loop Model in Wireless Sensor Networks. In: Tan, Y., Shi, Y., Mo, H. (eds) Advances in Swarm Intelligence. ICSI 2013. Lecture Notes in Computer Science, vol 7929. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38715-9_37

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-38715-9_37

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-38714-2

  • Online ISBN: 978-3-642-38715-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics