Skip to main content
Log in

A neighbor information based false data filtering scheme in wireless sensor networks

  • Published:
Journal of Central South University Aims and scope Submit manuscript

Abstract

In sensor networks, the adversaries can inject false data reports from compromised nodes. Previous approaches to filter false reports, e.g., SEF, only verify the correctness of the message authentication code (MACs) carried in each data report on intermediate nodes, thus cannot filter out fake reports that are forged in a collaborative manner by a group of compromised nodes, even if these compromised nodes distribute in different geographical areas. Furthermore, if the adversary obtains keys from enough (e.g., more than t in SEF) distinct key partitions, it then can successfully forge a data report without being detected en-route. A neighbor information based false report filtering scheme (NFFS) in wireless sensor networks was presented. In NFFS, each node distributes its neighbor information to some other nodes after deployment. When a report is generated for an observed event, it must carry the IDs and the MACs from t detecting nodes. Each forwarding node checks not only the correctness of the MACs carried in the report, but also the legitimacy of the relative position of these detecting nodes. Analysis and simulation results demonstrate that NFFS can resist collaborative false data injection attacks efficiently, and thus can tolerate much more compromised nodes than existing schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. REN Fen-yuan, HUANG Hai-ning, LIN Chuang. Wireless sensor networks [J]. Journal of Software, 2003, 14(7): 1282–1291.

    MATH  Google Scholar 

  2. PEI Zhi-qiang, XU Chang-qing, TENG Jin. Node scattering manipulation based on trajectory model in wireless sensor network [J]. Journal of Central South University of Technology, 2010, 17(5): 991–999.

    Article  Google Scholar 

  3. SU Zhong, LIN Chuang, FENG Fu-jun, REN Feng-yuan. Key management schemes and protocols for wireless sensor networks [J]. Journal of Software, 2007, 18(5): 1218–1231.

    Article  MATH  Google Scholar 

  4. YE Fan, LUO Hai-yun, LU Song-wu, ZHANG Li-xia. Statistical en-route filtering of injected false data in sensor networks [C]// Proceedings of 23th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM’ 04). Hong Kong, China, 2004: 2446–2457.

  5. ZHU Sen-cun, SETIA S, JAJODIA S. An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks [C]// Proceeding IEEE symposium on Security and privacy (S&P’ 04). California, USA, 2004: 259–271.

  6. YU ZHEN, GUAN Yong. A dynamic en-route scheme for filtering false data injection in wireless sensor networks [C]// Proceedings of 25th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM’ 06). Barcelona, Spain, 2006: 1–12.

  7. LI Yu, LI Jiang-zhong. Grouping-based resilient statistical en-route filtering for sensor networks [C]// Proceedings of 28th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2009). Rio de Janeiro, Brazil, 2009: 1782–1790.

  8. YANG Hao, LU Song-wu. Commutative cipher based en-route filtering in wireless sensor networks [C]// Vehicular Technology Conference (VTC’ 04). Los Angeles, USA, 2004: 1223–1227.

  9. WANG Hao-dong, LI Qun. PDF:A public-key based false data filtering scheme in sensor networks [C]// Proceedings of the International Conference on Wireless Algorithms, Systems and Applications (WASA’ 07). Chicago, USA, 2007: 129–138.

  10. AYDAY E, DELGOSHA F, FEKRI F. Location-aware security services for wireless sensor networks using network coding [C]// Proceedings of the IEEE Conference on Computing and Communicating (INFOCOM’ 07). Alaska, USA, 2007: 1226–1234.

  11. REN Kui, LOU Wen-jing, ZHANG Yan-chao. Providing location-aware end-to-end data security in wireless sensor networks [C]// Proceedings of the IEEE Conference on Computing and Communicating (INFOCOM’ 06). Barcelona, Spain, 2006: 585–598.

  12. LI Feng, SRINIVASAN A, WU Jie. A probabilistic voting-based filtering scheme in wireless sensor networks [C]// Proceedings of the International Wireless Communications and Mobile Computing Conference (IWCMC’ 06). Vancouver, Canada, 2006: 255–265.

  13. MIAO Ma. Resilience of sink filtering scheme in wireless sensor networks [J]. Computer Communications, 2006, 30(1): 55–65.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jian-xin Wang  (王建新).

Additional information

Foundation item: Projects(61173169, 61103203, 70921001) supported by the National Natural Science Foundation of China; Project(NCET-10-0798) supported by Program for New Century Excellent Talents in University of China

Rights and permissions

Reprints and permissions

About this article

Cite this article

Liu, Zx., Wang, Jx. & Zhang, Sg. A neighbor information based false data filtering scheme in wireless sensor networks. J. Cent. South Univ. 19, 3147–3153 (2012). https://doi.org/10.1007/s11771-012-1389-3

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11771-012-1389-3

Key words

Navigation