Directed diffusion: a scalable and robust communication paradigm for sensor networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Highly-resilient, energy-efficient multipath routing in wireless sensor networks
ACM SIGMOBILE Mobile Computing and Communications Review
Energy-Efficient Communication Protocol for Wireless Microsensor Networks
HICSS '00 Proceedings of the 33rd Hawaii International Conference on System Sciences-Volume 8 - Volume 8
Analyzing the energy consumption of security protocols
Proceedings of the 2003 international symposium on Low power electronics and design
Toward resilient security in wireless sensor networks
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks
ICDCS '05 Proceedings of the 25th IEEE International Conference on Distributed Computing Systems
Protocols and Architectures for Wireless Sensor Networks
Protocols and Architectures for Wireless Sensor Networks
A probabilistic voting-based filtering scheme in wireless sensor networks
Proceedings of the 2006 international conference on Wireless communications and mobile computing
STEF: A Secure Ticket-Based En-route Filtering Scheme for Wireless Sensor Networks
ARES '07 Proceedings of the The Second International Conference on Availability, Reliability and Security
Interleaved hop-by-hop authentication against false data injection attacks in sensor networks
ACM Transactions on Sensor Networks (TOSN)
Detecting Compromised Nodes in Wireless Sensor Networks
SNPD '07 Proceedings of the Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing - Volume 01
A Multipath En-Route Filtering Method for Dropping Reports in Sensor Networks
IEICE - Transactions on Information and Systems
A fuzzy-based interleaved multi-hop authentication scheme in wireless sensor networks
Journal of Parallel and Distributed Computing
Key inheritance-based false data filtering scheme in wireless sensor networks
ICDCIT'06 Proceedings of the Third international conference on Distributed Computing and Internet Technology
IEEE Communications Magazine
Statistical en-route filtering of injected false data in sensor networks
IEEE Journal on Selected Areas in Communications
Location-based compromise-tolerant security mechanisms for wireless sensor networks
IEEE Journal on Selected Areas in Communications
Computers and Electrical Engineering
Hi-index | 0.24 |
A compromised node can generate a fabricated report, which results in false alarms, information loss, and a waste of precious network energy. An interleaved hop-by-hop authentication (IHA) scheme has been proposed to minimize such serious damage by detecting and filtering false reports at the very early en-route nodes. Unfortunately, IHA, with a single path from the source to the BS, cannot keep its security goal if more than t intermediate nodes are compromised. In this paper, an enhanced multi-path interleaved hop-by-hop authentication (MIHA) scheme is proposed. MIHA sets up disjoint and braided paths and switches to alternate paths when there is more than t compromised nodes on the current path to continue dealing with en-route insider attacks. A new key assignment mechanism was also applied to enhance network security and to reduce key storage overhead. Through analysis and simulations, MIHA exhibits improved resilience to en-route insider attacks and filters more bogus reports at early hops than IHA. Specially, with an attack frequency of 1/15 and a false traffic rate of more than 60%, MIHA with three disjoint paths can filter over 27% of false reports and is more energy efficient when compared to IHA.