False data injection-resilient security routing protocol for wireless sensor networks

被引:0
作者
Zhang, Zhiming [1 ]
Jiang, Changgen [1 ]
机构
[1] School. of Software, Jiangxi Normal University, Nanchang
关键词
Bilinear pairings; False data injection attack; Path-based dos attack; Wireless sensor networks;
D O I
10.4304/jnw.7.12.2025-2030
中图分类号
学科分类号
摘要
False data injection attack and PDoS (path-based Denial of Service) attack are serious threats in wireless sensor networks. Existing schemes can effectively resist false data injection and PDoS attacks, but most of them can not find out the compromised node when the base station or sink node detect the report is invalid. In this paper, we propose a false data injection-resilient security routing protocol (FDISRP) based on bilinear pairings and different operation. The proposed protocol can resist false data injection and PDoS attacks, and if the report R is invalid, the proposed protocol can carry out the relative algorithm to find out the compromised node. The performance analysis shows that our scheme is lower in storage requirement than the others scheme, and with the number of fabricated report packet and the number of hops for report packet forwarding increasing, the energy savings significantly increasing also. © 2012 ACADEMY PUBLISHER.
引用
收藏
页码:2025 / 2030
页数:5
相关论文
共 15 条
  • [11] Zhu S., Setia S., Jajodia S., Ning P., An interleaved hop-by-hop authentication scheme for filtering false data injection in sensor networks, IEEE Proceedings of Symposium on Security and Privacy, pp. 259-271, (2004)
  • [12] Shukla V., Qiao D., Distinguishing Data Transience from False Injection in Sensor Networks, 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, pp. 41-50, (2007)
  • [13] Ma M., Resilience of sink filtering scheme in wireless sensor networks [J], Computer Communications, 30, 1, pp. 55-65, (2006)
  • [14] Li F.W.J., A probabilistic voting-based filtering scheme in wireless sensor networks, Proceedings of the International Wireless Communications and Mobile Computing Conference, pp. 255-265, (2006)
  • [15] Wang H., Li Q., PDF: A public-key based false data filtering scheme in sensor networks, Proceedings of the International Conference on Wireless Algorithms, Systems and Applications, pp. 129-138, (2007)