BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks

被引:97
作者
Lu, Rongxing [1 ]
Lin, Xiaodong [2 ]
Zhu, Haojin [3 ]
Liang, Xiaohui [1 ]
Shen, Xuemin [1 ]
机构
[1] Univ Waterloo, Dept Elect & Comp Engn, Waterloo, ON N2L 3G1, Canada
[2] Univ Ontario, Fac Business & Informat Technol, Inst Technol, Oshawa, ON L1H 7K4, Canada
[3] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China
关键词
Wireless sensor network; injecting false data attack; random graph; cooperative bit-compressed authentication; SECURITY;
D O I
10.1109/TPDS.2011.95
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Injecting false data attack is a well known serious threat to wireless sensor network, for which an adversary reports bogus information to sink causing error decision at upper level and energy waste in en-route nodes. In this paper, we propose a novel bandwidth-efficient cooperative authentication (BECAN) scheme for filtering injected false data. Based on the random graph characteristics of sensor node deployment and the cooperative bit-compressed authentication technique, the proposed BECAN scheme can save energy by early detecting and filtering the majority of injected false data with minor extra overheads at the en-route nodes. In addition, only a very small fraction of injected false data needs to be checked by the sink, which thus largely reduces the burden of the sink. Both theoretical and simulation results are given to demonstrate the effectiveness of the proposed scheme in terms of high filtering probability and energy saving.
引用
收藏
页码:32 / 43
页数:12
相关论文
共 32 条
[1]  
Akkaya K., 2005, Ad Hoc Networks, V3, P325, DOI 10.1016/j.adhoc.2003.09.010
[2]  
[Anonymous], 2010, MICAZ WIRELESS MEASU
[3]  
[Anonymous], 2010, IMOTE2 HIGH PERFORMA
[4]  
Benenson Z, 2006, INT FED INFO PROC, V201, P38
[5]  
Black J, 2005, J CRYPTOL, V18, P111, DOI [10.1007/s00145-004-0016-3, 10.1007/S00145-004-0016-3]
[6]  
Boyd C, 2004, LECT NOTES COMPUT SC, V3089, P248
[7]   Multicast security: A taxonomy and some efficient constructions [J].
Canetti, R ;
Garay, J ;
Itkis, G ;
Micciancio, D ;
Naor, M ;
Pinkas, B .
IEEE INFOCOM '99 - THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-3, PROCEEDINGS: THE FUTURE IS NOW, 1999, :708-716
[8]   Feedback-Based Clock Synchronization in Wireless Sensor Networks: A Control Theoretic Approach [J].
Chen, Jiming ;
Yu, Qing ;
Zhang, Yan ;
Chen, Hsiao-Hwa ;
Sun, Youxian .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2010, 59 (06) :2963-2973
[9]   Random graph theory based connectivity analysis in wireless sensor networks with Rayleigh fading channels [J].
Dong, Jingbo ;
Chen, Qing ;
Niu, Zhisheng .
2007 ASIA-PACIFIC CONFERENCE ON COMMUNICATIONS, 2007, :123-126
[10]   An effective key management scheme for heterogeneous sensor networks [J].
Du, Xiaojiang ;
Xiao, Yang ;
Guizani, Mohsen ;
Chen, Hslao-Hwa .
AD HOC NETWORKS, 2007, 5 (01) :24-34