A partial key pre-distribution based en-route filtering scheme for wireless sensor networks

被引:3
作者
Kumar, Alok [1 ]
Bansal, Neha [1 ]
Pais, Alwyn Roshan [1 ]
机构
[1] Natl Inst Technol Karnataka Surathkal, Dept Comp Sci & Engn, Informat Secur Res Lab, Mangalore, Karnataka, India
关键词
Combinatorial design; En-route filtering; Data authentication; Wireless sensor networks (WSNs); INJECTED FALSE DATA; SECURITY;
D O I
10.1007/s12652-020-02216-3
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Compromised sensor nodes can be used to inject false reports (bogus reports) in wireless ssensor networks (WSNs). This can cause the sink to take wrong decisions. En-route filtering is a method to detect and filter false reports from WSNs. Most of the existing en-route filtering schemes use probabilistic approaches to filter false reports from the network, where filtering of false reports is based on a fixed probability. Thus false reports can travel multiple hops before being dropped. In this article we seek to overcome limitations of the existing schemes and reduce the overall key storage overhead in the cluster heads. In this article we propose a combinatorial design based partial en-route filtering scheme (CD-PEFS) which filters the fabricated reports deterministically. CD-PEFS reduces the energy requirements in the network by early detection and elimination of the false reports. Adoption of combinatorial design based keys get rid of shared key discovery phase from the network. This considerably reduces the communication overhead in the network. We carried out a detailed analysis of CD-PEFS against an increasing number of compromised sensor nodes in the network. We found that our scheme performs better than existing schemes in terms of filtering efficiency while maintaining low key storage overhead in the network. Further the performance of CD-PEFS is at par with existing schemes in terms of other protocol overheads.
引用
收藏
页码:1471 / 1486
页数:16
相关论文
共 27 条
[1]   A survey on sensor networks [J].
Akyildiz, IF ;
Su, WL ;
Sankarasubramaniam, Y ;
Cayirci, E .
IEEE COMMUNICATIONS MAGAZINE, 2002, 40 (08) :102-114
[2]  
Anderson I., 1990, Combinatorial designs: construction methods
[3]  
[Anonymous], 2003, Proceedings of the 1st international conference on Embedded networked sensor systems, DOI DOI 10.1145/958491.958521
[4]  
Dickson L.E., 2003, Linear Groups: With an Exposition of the Galois Field Theory
[5]   On security of wireless sensor networks: a data authentication protocol using digital signature [J].
Ferng, Huei-Wen ;
Nguyen Minh Khoa .
WIRELESS NETWORKS, 2017, 23 (04) :1113-1131
[6]  
Harb H, 2018, INT WIREL COMMUN, P298, DOI 10.1109/IWCMC.2018.8450348
[7]  
He T., 2003, PROC 9 ANN INT C MOB, P81, DOI DOI 10.1145/938985.938995
[8]  
Kc G.S., 2003, Proceedings of the 10th ACM conference on Computer and communications security, P272
[9]  
Kraub C, 2007, ARES 2007: SECOND INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, P310
[10]   A new combinatorial design based key pre-distribution scheme for wireless sensor networks [J].
Kumar, Alok ;
Pais, Alwyn Roshan .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (06) :2413-2428