A Method for the Enhancement of the Detection Power and Energy Savings against False Data Injection Attacks in Wireless Sensor Networks

  • Su Man Nam
  • Tae Ho Cho
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7389)


Malicious attackers spread various attacks to destroy the system of the sensor network. False report injection attacks occur on the application layer and drain the energy resources of each node. Statistical en-route filtering (SEF) is proposed to detect and drop false reports in intermediate nodes during the forwarding process. In this work, we propose a security method to improve the detection power and energy savings using four types of keys. The performance of the proposed method was evaluated and compared to that of SEF against the attack. Our experimental results reveal that our method improves detection power and energy savings by up to 25% and 9%, respectively.


Sensor Network Sensor Node Wireless Sensor Network Intermediate Node Detection Power 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A Survey on Sensor Networks. IEEE Communications Magazine 40, 102–114 (2002)CrossRefGoogle Scholar
  2. 2.
    Chan, H., Perrig, A.: Security and Privacy in Sensor Networks. Computer 36, 103–105 (2003)CrossRefGoogle Scholar
  3. 3.
    Przydatek, B.D., Song, A.P.: SIA: Secure Information Aggregation in Sensor Networks. In: Proc. of CCNC, vol. 23, pp. 63–98 (2004)Google Scholar
  4. 4.
    Ye, F., Luo, H., Lu, S., Zhang, L.: Statistical En-route Filtering of Injected False Data in Sensor Networks. IEEE Journal on Selected Areas in Communications 23, 839–850 (2005)CrossRefGoogle Scholar
  5. 5.
    Sun, C.I., Lee, H.Y., Cho, T.H.: A Path Selection Method for Improving the Detection Power of Statistical Filtering in Sensor Networks. J. Inf. Sci. Eng. 25, 1163–1175 (2009)MathSciNetGoogle Scholar
  6. 6.
    Zhu, S., Setia, S., Jajodia, S.: LEAP: Efficient Security Mechanisms for Large-scale Distributed Sensor Networks. In: Proceedings of the 10th ACM Conference on Computer and Communications Security, pp. 62–72. ACM (2003)Google Scholar
  7. 7.
    Crossbow technology Inc.,
  8. 8.
    Intanagonwiwat, C., Govindan, R., Estrin, D.: Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks. In: MOBICOM, pp. 56–67. ACM (2000)Google Scholar
  9. 9.
    Ye, F., Chen, A., Lu, S., Zhang, L.: A Scalable Solution to Minimum Cost Forwarding in Large Sensor Networks. In: Proceedings of the Tenth International Conference on Computer Communications and Networks, pp. 304–309 (2001)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Su Man Nam
    • 1
  • Tae Ho Cho
    • 1
  1. 1.College of Information and Communication EngineeringSungkyunkwan UniversitySuwonRepublic of Korea

Personalised recommendations