Abstract
Wireless Sensor Networks (WSN) consist of a large number of sensor nodes equipped with limited computational capacity, memory and battery energy. As sensor nodes in WSN deployed in a hostile and unattended environment, the networks is susceptible to various malicious threats. False data injection is one of them. An adversary may attempt to inject false data containing non-existent events through some compromised nodes causing false alarms at the base station and draining out energy of forwarding nodes. As a result, detection of false data injection in WSN is an important concern. This paper presents a scheme using hash-based short signatures for filtering false data injection in WSN.
Keywords
- Sensor networks
- false data injection
- short signature
- node compromise
This is a preview of subscription content, access via your institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Callaway Jr., E.H.: Wireless Sensor Networks. Architectures and Protocols. Auerbach Publications (2003)
Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: A survey. Computer Networks 38(4), 393–422 (2002)
Yu, Z., Guan, Y.: A dynamic en-route scheme for filtering false data injection in wireless sensor networks. In: Proc. of the IEEE International Conference on Computer Communications (INFOCOM), pp. 1–12 (2006)
Dahmen, E., Krauß, C.: Short Hash-Based Signatures for Wireless Sensor Networks. In: Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. LNCS, vol. 5888, pp. 463–476. Springer, Heidelberg (2009)
Weise, T.: Global Optimization Algorithms - Theory and Application (2009), http://www.it-weise.de/
Wang, H., Li, Q.: PDF: A Public-key based False Data Filtering Scheme in Sensor Networks. In: Proc. of the International Conference on Wireless Algorithms, Systems and Applications, pp. 129–138 (2007)
Lee, S.J., Lee, H.Y., Cho, T.H.: Environment-based Selection Method for Enroute Filtering Scheme using Fuzzy Logic. Journal of Networks 5(3), 292–299 (2010)
Zhu, S., Setia, S., Jajodia, S., Ning, P.: An Interleaved Hop-by- Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks. In: Proc. of IEEE Symposium on Security and Privacy, pp. 259–271 (2004)
Ye, F., Luo, H., Lu, S., Zhang, L.: Statistical En-route Filtering of Injected False Data in Sensor Networks. In: Proc. of the IEEE International Conference on Computer Communications, INFOCOM (2004)
Zhang, Y., Liu, W., Lou, W., Fang, Y.: Location based Compromise-tolerant Security Mechanisms for Wireless Sensor Networks. IEEE Journal on Selected Areas in Communications 24(2), 247–260 (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Anudeep, C., Das, M.L. (2012). An Improved Scheme for False Data Filtering in Wireless Sensor Networks. In: Ramanujam, R., Ramaswamy, S. (eds) Distributed Computing and Internet Technology. ICDCIT 2012. Lecture Notes in Computer Science, vol 7154. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-28073-3_6
Download citation
DOI: https://doi.org/10.1007/978-3-642-28073-3_6
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-28072-6
Online ISBN: 978-3-642-28073-3
eBook Packages: Computer ScienceComputer Science (R0)
