False data injection-resilient security routing protocol for wireless sensor networks

被引:0
作者
Zhang, Zhiming [1 ]
Jiang, Changgen [1 ]
机构
[1] School. of Software, Jiangxi Normal University, Nanchang
关键词
Bilinear pairings; False data injection attack; Path-based dos attack; Wireless sensor networks;
D O I
10.4304/jnw.7.12.2025-2030
中图分类号
学科分类号
摘要
False data injection attack and PDoS (path-based Denial of Service) attack are serious threats in wireless sensor networks. Existing schemes can effectively resist false data injection and PDoS attacks, but most of them can not find out the compromised node when the base station or sink node detect the report is invalid. In this paper, we propose a false data injection-resilient security routing protocol (FDISRP) based on bilinear pairings and different operation. The proposed protocol can resist false data injection and PDoS attacks, and if the report R is invalid, the proposed protocol can carry out the relative algorithm to find out the compromised node. The performance analysis shows that our scheme is lower in storage requirement than the others scheme, and with the number of fabricated report packet and the number of hops for report packet forwarding increasing, the energy savings significantly increasing also. © 2012 ACADEMY PUBLISHER.
引用
收藏
页码:2025 / 2030
页数:5
相关论文
共 15 条
  • [1] Krauss C., Schneider M., Bayarou K., Eckert C., STEF: A Secure Ticket-Based En-route Filtering Scheme for Wireless Sensor Networks, 2007 the Second International Conference on Availability, pp. 310-317, (2007)
  • [2] Krauss C., Schneider M., Eckert C., Defending against false-endorsement-based dos attacks in wireless sensor networks, Proceedings of the First ACM Conference on Wireless Network Security, pp. 13-23, (2008)
  • [3] Enzmann M., Krauss C., Eckert C., PDoS-Resilient Push Protocols for Sensor Networks, Third International Conference on Sensor Technologies and Applications, pp. 455-461, (2009)
  • [4] Ye F., Luo H., Lu S., Zhang L., Statistical en-route Filtering of injected false data in sensor networks, Proc. of the 23rd Annumal Joint Conf. of the IEEE Computer and Communications Societies (INFOCOM 2004), pp. 2446-2457, (2004)
  • [5] Barreto P.S.L.M., Kim H.Y., Scott M., Efficient Algorithms for Pairing-based Cryptosystems. Advances in Cryptology-Crypto 2002, Lecture Notes in Computer Science, 2442, pp. 354-368, (2002)
  • [6] Deng J., Han R., Mishra S., Defending Against Path-based DoS Attacks in Wireless Sensor Networks. the Third ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 89-96, (2005)
  • [7] Yu Z., Guan Y., A Dynamic En-route Scheme for Filtering False Data Injection in Wireless Sensor Networks, 25th IEEE International Conference on Computer Communications, pp. 294-295, (2006)
  • [8] Yuan T., Zhang S., Zhong Y., Kaef J.M., An En-route Scheme of Filtering False Data in Wireless Sensor Networks, 2008 IEEE International Performance Computing and Communications Conference, pp. 193-200, (2008)
  • [9] Zhi-Xiong L.I.U., Jian-Xin W.A.N.G., Geographical information based false report filtering scheme in wireless sensor networks, Journal on Communications, 33, 2, pp. 156-163, (2012)
  • [10] Yu L., Li J., Grouping-based Resilient Statistical En-route Filtering for Sensor Networks, pp. 1782-1790, (2009)