Open Access Open Access  Restricted Access Subscription Access

Prevention Method of False Report Generation in Cluster Heads for Dynamic En-Route Filtering of Wireless Sensor Networks


Affiliations
1 College of Information and Communication Engineering, Sungkyunkwan University, Suwon 16419, Korea, Democratic People's Republic of
2 College of Software Platform, Sungkyunkwan University, Suwon 16419, Korea, Democratic People's Republic of
 

Wireless sensor networks collect data through collaborative communication between sensor nodes. sensor nodes of wireless sensor networks are deployed in open environments. Hence, an attacker can easily compromise the node. An attacker can compromise a node to generate false reports and inject into the network. This causes unnecessary energy consumption in the process of transmitting false alarm messages and false data reports to the system. If the attacker keeps repeatedly attacking thereby causing problems such as reduction in the entire network life or disabling the networks. Yu and Guan proposed a dynamic en-route filtering scheme to detect and drop these false reports before reaching to the Base station. In the dynamic en-route filtering, the energy waste of the intermediate nodes occurs until it is detected early. In this paper, we propose a method to save the energy of the intermediate nodes by searching for the compromised node and blocking the reports generated at that node. When verifying a false report at the verification node, it can know report information. The base station is able to find the cluster of compromised nodes using that information. In particular, the base station can know the location of the node that has been compromised, we can block false alarms and energy losses by blocking reports generated in that cluster.

Keywords

Network Simulation, Wireless Sensor Network, Dynamic En-Route Filtering, False Report Injection Attack.
User
Notifications
Font Size

  • Reejamol, K. J., and P. Dhanya Raj. "Hole handling techniques in wireless sensor networks: A survey." Computational Intelligence and Computing Research (ICCIC), 2016 IEEE International Conference on. IEEE, (2016)
  • Nam, Su Man, and Tae Ho Cho. "A fuzzy rule-based path configuration method for LEAP in sensor networks." Ad Hoc Networks 31 (2015)
  • H. Park and T. H. Cho. Partial path selection method in each subregion for routing path optimization in SEF based sensor networks. Journal of Korean Institute of Intelligent Systems 22(1), pp. 108-113. (2012)
  • Mansouri, Djamel, et al. "Detecting DoS attacks in WSN based on clustering technique." 2013 IEEE Wireless Communications and Networking Conference (WCNC). IEEE, (2013)
  • Winkler, Thomas, and Bernhard Rinner. "Security and privacy protection in visual sensor networks: A survey." ACM Computing Surveys (CSUR) 47.1 (2014)
  • F. Ye, H. Luo, S. Lu and L. Zhang, "Statistical en-route filtering of injected false data in sensor networks," Selected Areas in Communications, IEEE Journal on, vol. 23, pp. 839-850, (2005)
  • Lu, Rongxing, et al. "BECAN: a bandwidth-efficient cooperative authentication scheme for filtering injected false data in wireless sensor networks." IEEE transactions on parallel and distributed systems 23.1 (2012)
  • Li, Feng, and Jie Wu. "A probabilistic voting-based filtering scheme in wireless sensor networks." Proceedings of the 2006 international conference on Wireless communications and mobile computing. ACM, (2006)
  • Yu, Zhen, and Yong Guan. "A dynamic en-route filtering scheme for data reporting in wireless sensor networks." IEEE/ACM Transactions on Networking (ToN) 18.1 (2010)
  • Yang, Hao, and Songwu Lu. "Commutative cipher based en-route filtering in wireless sensor networks." Vehicular Technology Conference, 2004. VTC2004-Fall. 2004 IEEE 60th. Vol. 2. IEEE, (2004)
  • Gupta, Pallavi, Vinay Prakash, and Preetam Suman. "Noticeable key points and issues of sensor deployment for large area Wireless Sensor Network: A survey." System Modeling & Advancement in Research Trends (SMART), International Conference. IEEE, (2016).
  • Mohammed, Fihri, et al. "Investigating the impact of black-hole attack on hierarchical protocols and direct transmission in WSN." Proceedings of the International Conference on Internet of things and Cloud Computing. ACM, (2016)
  • Joshi, Jetendra, et al. "SEED: Secure and energy efficient data transmission in Wireless Sensor Networks." Information and Communication Technology (ICoICT), 2016 4th International Conference on. IEEE, (2016)
  • Saghar, Kashif, et al. "RAEED: A formally verified solution to resolve sinkhole attack in Wireless Sensor Network." Applied Sciences and Technology (IBCAST), 2016 13th International Bhurban Conference on. IEEE, (2016)
  • Wang, Ding, and Ping Wang. "Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks." Ad Hoc Networks 20 (2014)
  • Kumar, Vikash, Anshu Jain, and P. N. Barwal. "Wireless sensor networks: security issues, challenges and solutions." International Journal of Information and Computation Technology (IJICT) 4.8 (2014)
  • Hwang, Ren Junn, and Yan Zhi Huang. "Secure Data Collection Scheme for Wireless Sensor Networks." Advanced Information Networking and Applications Workshops (WAINA), 2017 31st International Conference on. IEEE, (2017)

Abstract Views: 449

PDF Views: 170




  • Prevention Method of False Report Generation in Cluster Heads for Dynamic En-Route Filtering of Wireless Sensor Networks

Abstract Views: 449  |  PDF Views: 170

Authors

Jung-Sub Ahn
College of Information and Communication Engineering, Sungkyunkwan University, Suwon 16419, Korea, Democratic People's Republic of
Tae-Ho Cho
College of Software Platform, Sungkyunkwan University, Suwon 16419, Korea, Democratic People's Republic of

Abstract


Wireless sensor networks collect data through collaborative communication between sensor nodes. sensor nodes of wireless sensor networks are deployed in open environments. Hence, an attacker can easily compromise the node. An attacker can compromise a node to generate false reports and inject into the network. This causes unnecessary energy consumption in the process of transmitting false alarm messages and false data reports to the system. If the attacker keeps repeatedly attacking thereby causing problems such as reduction in the entire network life or disabling the networks. Yu and Guan proposed a dynamic en-route filtering scheme to detect and drop these false reports before reaching to the Base station. In the dynamic en-route filtering, the energy waste of the intermediate nodes occurs until it is detected early. In this paper, we propose a method to save the energy of the intermediate nodes by searching for the compromised node and blocking the reports generated at that node. When verifying a false report at the verification node, it can know report information. The base station is able to find the cluster of compromised nodes using that information. In particular, the base station can know the location of the node that has been compromised, we can block false alarms and energy losses by blocking reports generated in that cluster.

Keywords


Network Simulation, Wireless Sensor Network, Dynamic En-Route Filtering, False Report Injection Attack.

References