Abstract
Sensor nodes communicate with each other via wireless channels, which are not particularly secure. Accordingly, sensor nodes are vulnerable to physical attacks, potentially compromising the node’s keys. An adversary can capture deployed nodes and inject the false reports using captured nodes. False reports attacks can lead not only false alarms, but also the depletion of energy resource of nodes. Yet et al. proposed statistical en-route filtering scheme to filter out such false report in en-route process. Several research efforts to improve the detection power of SEF have been made. Sun et al. proposed a path selection method (PSM) for improving the detection power of SEF using a control message contained the key information of visited nodes. However, the key information does not be updated or reset in the flooding process. Consequently, nodes which are located far from the sink cannot evaluate accurate quality of the incoming path and choose the secure paths. In this paper, we proposed an advanced path selection method for improving the detection power of PSM using two partition arrays and information of downstream nodes of forwarding node. By using this information, each node evaluates and chooses the most secure paths. To show the effectiveness, we have compared the proposed method with the two existing methods, SEF and PSM, in terms of filtering ratio of false reports and energy consumption for detection by providing simulation results.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Akyldiz, I.F., et al.: A Survey on Sensor Networks. IEEE Wireless Communication Magazine 40(8), 102–116 (2002)
Arampatzis, T., Lygeros, J., Manesis, S.: A survey of applications of wireless sensor and wireless sensor networks. In: Proceedings of IEEE International Symposium on, Mediterrean Conference on Control and Automation, Limassol, Cyprus, June 27-29, pp. 719–724 (2005)
Culler, D., Estrin, D., Srivastava, M.: Overview of sensor networks. IEEE Comput. 8, 41–49 (2004)
Wang, Y., et al.: Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor Networks. IEEE Transaction on Mobile Computing 7(6), 698–711 (2008)
Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Netw. 1, 293–315 (2003)
Ye, F., Luo, H., Lu, S.: Statistical en-route filtering of injected false data in sensor networks. IEEE J. Sel. Area. Commun. 23, 839–850 (2005)
Li, F., Wu, J.: A probabilistic voting-based filtering scheme in wireless sensor networks. In: Proceedings of International Conference on Wireless Communications and Mobile Computing, vol. 3-6, pp. 27–32 (2006)
Yu, Z., Guan, Y.: A Dynamic En-route Scheme for Filtering False Data in Wireless Sensor Networks. In: Proceedings of the 3rd International Conference on Embedded Networked Sensor Systems, pp. 294–295 (2006)
Sun, C.I., Lee, H.Y., Cho, T.H.: A path selection method for improving the detection power of statistical filtering in sensor networks. J. Inf. Sci. Eng. 25, 1163–1175 (2009)
Lee, H.Y., Cho, T.H.: Fuzzy-based path selection method for improving the detection of false reports in sensor networks. IEICE Trans. Inf. Syst. E92-D, 1574–1576 (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Sun, C.I., Cho, T.H. (2012). Advanced Path Selection Method for Detection of False Reports in Statistical Filtering Based WSNs. In: Jung, S., Yung, M. (eds) Information Security Applications. WISA 2011. Lecture Notes in Computer Science, vol 7115. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27890-7_19
Download citation
DOI: https://doi.org/10.1007/978-3-642-27890-7_19
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-27889-1
Online ISBN: 978-3-642-27890-7
eBook Packages: Computer ScienceComputer Science (R0)