Securing Data Aggregation against False Data Injection in Wireless Sensor Networks

被引:0
作者
Boonsongsrikul, Anuparp [1 ]
Lhee, Kyung-suk [1 ]
Hong, ManPyo [1 ]
机构
[1] Ajou Univ, Digital Vaccine & Internet Immune Syst Lab, Graudate Sch Informat & Commun, Suwon 441749, South Korea
来源
12TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY: ICT FOR GREEN GROWTH AND SUSTAINABLE DEVELOPMENT, VOLS 1 AND 2 | 2010年
关键词
sensor networks; data aggregation; security; false data injection attack; tracking back the attacker;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Data aggregation is an efficient technique for reducing communication cost in wireless sensor networks. However it is vulnerable to false data injection attacks where the adversary node sends false data to the aggregation node and thus, stops the base station to acquire correct data. This paper proposes a secured data aggregation protocol which detects the false data injection during the data aggregation and identifies the adversary node. The protocol is lightweight because it requires only a minimal cryptographic techniques, and takes O(n) time for both data aggregation and tracking back the attacker.
引用
收藏
页码:29 / 34
页数:6
相关论文
共 15 条
[1]  
Alzaid Hani., 2008, 6th Australasian conference on Information security (AISC), P93
[2]  
Chan Haowen., 2006, Proc. of the 13th ACM Conference on Computer and Communications Security, P278
[3]  
Chan HW, 2005, IEEE INFOCOM SER, P524
[4]   PDA: Privacy-preserving data aggregation in wireless sensor networks [J].
He, Wenbo ;
Liu, Xue ;
Nguyen, Hoang ;
Nahrstedt, Klara ;
Abdelzaher, Tarek .
INFOCOM 2007, VOLS 1-5, 2007, :2045-+
[5]   TAG:: a Tiny AGgregation service for ad-hoc sensor networks [J].
Madden, S ;
Franklin, MJ ;
Hellerstein, JM ;
Wei, H .
USENIX ASSOCIATION PROCEEDINGS OF THE FIFTH SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, 2002, :131-146
[6]  
Mlaih E., 2008, P IEEE INFOCOM WORKS, P1, DOI DOI 10.1109/INFOCOM.2008.4544601
[7]   Unbalanced data classification using extreme outlier elimination and sampling techniques for fraud detection [J].
Padmaja, T. Maruthi ;
Dhulipalla, Narendra ;
Bapi, Raju S. ;
Krishna, P. Radha .
ADCOM 2007: PROCEEDINGS OF THE 15TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATIONS, 2007, :511-+
[8]   SPINS: Security protocols for sensor networks [J].
Perrig, A ;
Szewczyk, R ;
Tygar, JD ;
Wen, V ;
Culler, DE .
WIRELESS NETWORKS, 2002, 8 (05) :521-534
[9]  
Przydatek B., 2003, Proceedings of the 1st international conference on Embedded networked sensor systems, P255, DOI [10.1145/958491.958521, DOI 10.1145/958491.958521]
[10]  
Ross Stephen M., 2003, J ENG TECHNOLOGY SPR