Skip to main content

An Improved Scheme for False Data Filtering in Wireless Sensor Networks

  • Conference paper
  • 1035 Accesses

Part of the Lecture Notes in Computer Science book series (LNISA,volume 7154)

Abstract

Wireless Sensor Networks (WSN) consist of a large number of sensor nodes equipped with limited computational capacity, memory and battery energy. As sensor nodes in WSN deployed in a hostile and unattended environment, the networks is susceptible to various malicious threats. False data injection is one of them. An adversary may attempt to inject false data containing non-existent events through some compromised nodes causing false alarms at the base station and draining out energy of forwarding nodes. As a result, detection of false data injection in WSN is an important concern. This paper presents a scheme using hash-based short signatures for filtering false data injection in WSN.

Keywords

  • Sensor networks
  • false data injection
  • short signature
  • node compromise

This is a preview of subscription content, access via your institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   54.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   69.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Callaway Jr., E.H.: Wireless Sensor Networks. Architectures and Protocols. Auerbach Publications (2003)

    Google Scholar 

  2. Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: A survey. Computer Networks 38(4), 393–422 (2002)

    CrossRef  Google Scholar 

  3. Yu, Z., Guan, Y.: A dynamic en-route scheme for filtering false data injection in wireless sensor networks. In: Proc. of the IEEE International Conference on Computer Communications (INFOCOM), pp. 1–12 (2006)

    Google Scholar 

  4. Dahmen, E., Krauß, C.: Short Hash-Based Signatures for Wireless Sensor Networks. In: Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. LNCS, vol. 5888, pp. 463–476. Springer, Heidelberg (2009)

    CrossRef  Google Scholar 

  5. Weise, T.: Global Optimization Algorithms - Theory and Application (2009), http://www.it-weise.de/

  6. Wang, H., Li, Q.: PDF: A Public-key based False Data Filtering Scheme in Sensor Networks. In: Proc. of the International Conference on Wireless Algorithms, Systems and Applications, pp. 129–138 (2007)

    Google Scholar 

  7. Lee, S.J., Lee, H.Y., Cho, T.H.: Environment-based Selection Method for Enroute Filtering Scheme using Fuzzy Logic. Journal of Networks 5(3), 292–299 (2010)

    CrossRef  MathSciNet  Google Scholar 

  8. Zhu, S., Setia, S., Jajodia, S., Ning, P.: An Interleaved Hop-by- Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks. In: Proc. of IEEE Symposium on Security and Privacy, pp. 259–271 (2004)

    Google Scholar 

  9. Ye, F., Luo, H., Lu, S., Zhang, L.: Statistical En-route Filtering of Injected False Data in Sensor Networks. In: Proc. of the IEEE International Conference on Computer Communications, INFOCOM (2004)

    Google Scholar 

  10. Zhang, Y., Liu, W., Lou, W., Fang, Y.: Location based Compromise-tolerant Security Mechanisms for Wireless Sensor Networks. IEEE Journal on Selected Areas in Communications 24(2), 247–260 (2006)

    CrossRef  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Anudeep, C., Das, M.L. (2012). An Improved Scheme for False Data Filtering in Wireless Sensor Networks. In: Ramanujam, R., Ramaswamy, S. (eds) Distributed Computing and Internet Technology. ICDCIT 2012. Lecture Notes in Computer Science, vol 7154. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-28073-3_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-28073-3_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-28072-6

  • Online ISBN: 978-3-642-28073-3

  • eBook Packages: Computer ScienceComputer Science (R0)