Computer Science ›› 2013, Vol. 40 ›› Issue (9): 78-83.

Previous Articles     Next Articles

Efficiency Filtering Scheme for False Data in Wireless Sensor Networks

ZHAO Jin-guo,ZHU Ling-zhi,LUO Qing-yun and LIANG Jun-bin   

  • Online:2018-11-16 Published:2018-11-16

Abstract: The fundamental reason for low efficiency of false report filtering in wireless sensor networks is the lack of security assurance of the secrets while improving the degree of secret sharing.This paper presented an efficient false report filtering scheme.First we divided the network into clusters and constructed a cluster heads-tree,and then form relationships between the cluster heads were formed.By taking into account of the burden factor of nodes in the keys dissemination procedure,the scheme guarantees that the forwarding nodes closer to a cluster hold more authentication keys for the cluster than those nodes farther from it do,hence,the degree of secret sharing can be elevated.What’s more,several keys from the same oral cluster are hold by different nodes in a forwarding cluster so as to guarantee the securityof the keys.Analysis and simulation results show that the filtering procedure based on grouped cluster-keys outperforms existing schemes in terms of energy saves,storage overhead and filtering performances.

Key words: Wireless sensor networks,False data filtering,Cluster heads-tree,Burden factor,Keys dissemination

[1] 任丰原,黄海宁,林闯.无线传感器网络[J].软件学报,2003,4(7):1282-1291
[2] 苏忠,林闯,封富君,等.无线传感器网络密钥管理的方案和协议[J].软件学报,2007,8(5):1218-1231
[3] Ye F,Luo H,Zhang L.Statistical En-route Filtering of Injected False Data in Sensor Networks[C]∥Proceedings of 23th AnnualJoint Conference of the IEEE Computer and Communications Societies(INFOCOM 2004).2004:2446-2457
[4] Zhu S,Setia S,Jajodia S.An interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks[C]∥Proceedings of the IEEE symposium on Security and privacy(S&P’04).2004:259-271
[5] Li F,Wu J.A probabilistic voting-based filtering scheme inwireless sensor networks[C]∥Proceedings of the International Wireless Communications and Mobile Computing Conference(IWCMC 2006).2006:255-265
[6] Yu Z,Guan Y.A Dynamic En-route Scheme for Filtering False Data Injection in Wireless Sensor Networks[C]∥ Proceedings of the 3rd international conference on Embedded networked sensor systems(SenSys’05).2005:294-295
[7] Zhou L,Ravishankar C.A fault localized scheme for false report filtering in sensor networks[C]∥Proceedings of the IEEE International Conference on Pervasive Services(ICPS’05).2005:59-68
[8] Yang H,Ye F,Yuan Y,et al.Toward resilient security in wireless sensor networks[C]∥ Proceedings of the 6th ACM international symposium on mobile ad hoc networking and computing(MobiHoc’05).2005:34-45
[9] Zhang Y,Yang J,Vu H.The Interleaved Authentication for Filtering False Reports in Multipath Routing based Sensor Networks[C]∥Proceedings of 20th International Parallel and Distributed Processing Symposium (IPDPS’06).2006:1-10
[10] Yang H,Lu S.Commutative Cipher Based En-route Filtering in Wireless Sensor Networks[C]∥Vehicular Technology Confe-rence(VTC’04).2004:1223-1227
[11] Wang H,Li Q.PDF:A Public-key based False Data Filtering Scheme in Sensor Networks[C]∥Proceedings of the International Conference on Wlreless Algorithms,Systems and Applications(WASA’07).2007:129-138
[12] Ayday E,Delgosha F,Fekri F.Location-aware security services for wireless sensor networks using network coding[C]∥ Proceedings of the IEEE Conference on Computer Communications(INFOCOM 2007).2007:1226-1234
[13] Ren K,Lou W,Zhang Y.Providing location-aware end-to-enddata security in wireless sensor networks[C]∥Proceedings of the IEEE Conference on Computing and Communicating(INFOCOM 2006).2006:585-598
[14] Feng J,Potkonjak M.Real-time watermarking techniques forsensor networks[C]∥Proceedings of the SPIE Security and Watermarking of Multimedia Contents.California,2003:391-402
[15] 彭志娟,王汝传,王海燕.基于数字水印技术的无线传感器网络安全机制研究[J].南京邮电大学学报:自然科学版,2006,26(4):69-72
[16] 易叶青,林亚平,李小龙.WSN中基于协作水印的虚假数据过滤算法[J].软件学报,2010,21(1):107-118
[17] Liu D,Ning P.Location-Based Pairwise Key Establishments for Static Sensor Networks[C]∥Proceedings of the 1st ACM workshop on Security in Ad Hoc and Sensor Networks,SASN’03.2003:72-82
[18] Liu D,Ning P.Establishing Pairwise Keys in Distributed Sensor Networks[C]∥Proceedings of the 10th ACM conference on computer and communications security,ACM’05.2005:52-61
[19] Zhu S,Setia S,Jajodia S.LEAP:Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks[C]∥Proceedings of the 10th ACM Conference on Computer and Communications Security,CCS’03.2003::62-72
[20] Hussain S,Islam O.An energy efficient spanning tree basedmulti-hop routing in wireless sensor networks[C]∥Proceedings of Wireless Communications and Networking Conference(WCNC’07).2007:4383-4388

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!