Springer Nature is making SARS-CoV-2 and COVID-19 research free. View research | View latest news | Sign up for updates

Dropping False Packet to Increase the Network Lifetime of Wireless Sensor Network using EFDD Protocol

  • 263 Accesses

  • 2 Citations


In Wireless Sensor Network (WSN) sensors are densely deployed where the intruders can compromise some sensor nodes and inject false data in order to raise false alarms, reduce network lifetime, utilize bandwidth resources and so on. False Data Injection can possibly occur in Data Aggregation (DA) and Data Forwarding (DF). This paper analyses EFDD Protocol-Early False Data Detection Protocol which addresses the two possibilities in a simple and secure way considering the constraints of sensor nodes. The main idea is the selection of the network structure; this protocol will work effectively in Spatial/Semantic Correlation Tree Structure (SCT). False Data Detection in DA is done using some monitoring nodes which will monitor the Data Aggregator. EFDD in SCT structure reduce the counterfeit data transmission when compared to other structure in a better way. The result shows that EFDD reduce data transmission by dropping false data earlier and it also reduces computation when compared to the existing schemes.

This is a preview of subscription content, log in to check access.


  1. 1

    Bojkovic Z.S., Bakmaz B.M., Bakmaz M.R. (2008) Security issues in wireless sensor network. Intenational Journal of Commnications 2(1): 106–115

  2. 2

    Krishnamachari, B., Estrin, D., & Wicker, S. (2002). Impact on Data Aggregation in wireless sensor network. Distributed Computing Systems Workshops. (DEBS), Vienna, Austria.

  3. 3

    Zhu Y., Vedantham R., Park S.-J., Sivakumar R. (2008) A scalable correlation aware aggregation strategy for wireless sensor networks. Journal Information fusion archive 9(3): 354–369

  4. 4

    Ye F., Luo H., Lu S., Zhang L. (2005) Statistical en-route detection and filtering of injected false data in sensor networks. IEEE Journal of Selected Areas in Communications 23(4): 839–850

  5. 5

    Yu, Z., & Guan, Y. (2006). A dynamic en-route scheme for filtering false data in wireless sensor networks. In Proceedings of the IEEE INFOCOM, pp. 1–12, Barcelona, Spain, April 23–27.

  6. 6

    Hu, L., Evans, D. (2003). Secure aggregation for wireless networks. In Proceedings of the workshop security assurance Ad hoc networks, pp. 384–394, Orlando, FL, January 28.

  7. 7

    Du, W., Deng, J., Han, Y. S., & Varshney, P. K. (2003). A witness-based approach for data fusion assurance in wireless sensor networks. In Proceedings of the IEEE GLOBECOM, pp. 1435–1439.

  8. 8

    Przydatek, B., Song, D., & Perrig, A. (2003). SIA: Secure information aggregation in sensor networks. In Proceedings of the SenSystems, pp. 255–265.

  9. 9

    Çam H., Ozdemir S., Nair P., Muthuavinashiappan D., Sanli H. O. (2006) Energy-efficient and secure pattern based data aggregation for wireless sensor networks. Computer Communications 29(4): 446–455

  10. 10

    Shu J., Chen Y., Liu L., Zhang S., Li J. (2010) Study on aggregation tree construction based on GRID. Journal of Computers 5(6): 852–860

  11. 11

    Rivest, R. L. (1994). The RC5 encryption algorithm. In Proceedings of the 2nd international workshop FSE, pp. 86–96.

  12. 12


  13. 13

    Manoj, R., & Dhinakaran, N. Survey of key predistribution schemes for key management in wireless sensor networks. ICNVS’10 Proceedings of the 12th international conference on Networking, VLSI and Signal Processing, 135–140.

  14. 14


  15. 15

    Ozdemir S., Çam H. (2010) Integration of false data detection with data aggregation and confidential transmission in wireless sensor networks. IEEE/ACM Transactions on Networking 18(3): 736–749

  16. 16

    Ding M., Cheng X., Xue G. (2003) Aggregation tree construction in sensor network. IEEE 58th Vehicular Technology Conference 4: 2168–2172

  17. 17

    Preda R.O., Vizireanu D.N. (2011) A robust wavelet based video watermarking scheme for copyright protection using the human visual system. Journal of Electronic Imaging 20: 013022

  18. 18

    Sandhya M. K., Murugan K. (2011) Secure data aggregation in wireless sensor networks using privacy homomorphism. Journal of Advances in Networks and Communications 132(2): 482–490

  19. 19

    Preda R. O., Vizireanu D. N. (2011) Quantization based video watermarking in the wavelet domain with spatial and temporal redundancy. International Journal of Electronics 98(03): 393–405

  20. 20

    Preda R. O., Vizireanu D. N. (2010) A robust digital watermarking scheme for video copyright protection in the wavelet domain. Measurement 43(10): 1720–1726

  21. 21

    Lee H. Y., Cho T. H., Kim H.-J. (2010) Fuzzy-based detection of injected false data in wireless sensor networks. Journal of Information Security and Assurance 76: 128–137

  22. 22

    Tan H. O., Korpeoglu I., Stojmenovic I. (2011) Computing localized power—efficient data aggregation trees for sensor networks. Journal of Parallel and Distributed Systems–IEEE 22(3): 489–500

  23. 23

    Zhu Y., Vedantham R., Park S.-J., Sivakumar R. (2008) A scalable correlation aware aggregation strategy for wireless sensor networks. ACM Journal of Information Fusion 9(3): 354–369

  24. 24

    Zhu, S., Setia, S., Jajodia, S., & Ning, P. (2007). Interleaved hop-by-hop authentication against false data injection attacks in sensor networks. Journal ACM Transactions on Sensor Networks, 3(3), Article no: 14.

  25. 25

    Dsoul, M., Al-Khasawneh, A., Abdallah, A. E., & Obeidat, I. (2012). An energy threhold-based clustering protocol for wireless sensor networks. Journal of Wireless personal Communications, pp. 1–14.

  26. 26

    Gao T., Jin R. C., Song J. y., Xu T. B., Wang L. D. (2012) Energy-efficient cluster head selection scheme based on multiple criteria decision making for wireless sensor networks. Journal of Wireless personal Communications 63(4): 871–894

Download references

Author information

Correspondence to S. Manoj Kumar.

Rights and permissions

Reprints and Permissions

About this article

Cite this article

Manoj Kumar, S., Rajkumar, N. & Catherine Christinal Mary, W. Dropping False Packet to Increase the Network Lifetime of Wireless Sensor Network using EFDD Protocol. Wireless Pers Commun 70, 1697–1709 (2013). https://doi.org/10.1007/s11277-012-0775-3

Download citation


  • Wireless sensor networks
  • Data aggregation
  • SCT
  • Load balancing
  • Data integrity
  • Message authentication code