Efficient key establishment for group-based wireless sensor deployments
Proceedings of the 4th ACM workshop on Wireless security
A resilient packet-forwarding scheme against maliciously packet-dropping nodes in sensor networks
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
Efficient selection method of message authentication codes for filtering scheme in sensor networks
Proceedings of the 2nd international conference on Ubiquitous information management and communication
ICIC '08 Proceedings of the 4th international conference on Intelligent Computing: Advanced Intelligent Computing Theories and Applications - with Aspects of Theoretical and Methodological Issues
A General Framework for Adaptive Filtering in Wireless Sensor Networks Based on Fuzzy Logic
ICIC '08 Proceedings of the 4th international conference on Intelligent Computing: Advanced Intelligent Computing Theories and Applications - with Aspects of Theoretical and Methodological Issues
An authentication scheme for filtering injected bogus data in sensor networks
Computer Communications
ARCMA: attack-resilient collaborative message authentication in wireless sensor networks
Proceedings of the 4th international conference on Security and privacy in communication netowrks
A Secure Message Percolation Scheme for Wireless Sensor Network
Information Networking. Towards Ubiquitous Networking and Services
Energy efficient filtering method in sensor networks
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication
CEA'09 Proceedings of the 3rd WSEAS international conference on Computer engineering and applications
A Multipath En-Route Filtering Method for Dropping Reports in Sensor Networks
IEICE - Transactions on Information and Systems
Fuzzy Adaptive Partitioning Method for the Statistical Filtering
IEICE - Transactions on Information and Systems
CORA: Correlation-based resilient aggregation in sensor networks
Ad Hoc Networks
ALPHA: an adaptive and lightweight protocol for hop-by-hop authentication
CoNEXT '08 Proceedings of the 2008 ACM CoNEXT Conference
Significance-Based Failure and Interference Detection in Data Streams
DEXA '09 Proceedings of the 20th International Conference on Database and Expert Systems Applications
Distributed detection in the presence of Byzantine attacks
IEEE Transactions on Signal Processing
Cluster adaptation method to enhance performance of filtering scheme in sensor networks
ICACT'09 Proceedings of the 11th international conference on Advanced Communication Technology - Volume 1
Fuzzy adaptive threshold determining in the key inheritance based sensor networks
IEA/AIE'07 Proceedings of the 20th international conference on Industrial, engineering, and other applications of applied intelligent systems
A fuzzy-based en-route filtering scheme in sensor networks
ICIC'07 Proceedings of the intelligent computing 3rd international conference on Advanced intelligent computing theories and applications
Fuzzy key dissemination limiting method for the dynamic filtering-based sensor networks
ICIC'07 Proceedings of the intelligent computing 3rd international conference on Advanced intelligent computing theories and applications
Bogus data filtering in sensor networks
PAKDD'07 Proceedings of the 2007 international conference on Emerging technologies in knowledge discovery and data mining
OTM'07 Proceedings of the 2007 OTM Confederated international conference on On the move to meaningful internet systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part I
A multi-path interleaved hop-by-hop en-route filtering scheme in wireless sensor networks
Computer Communications
ICIC'09 Proceedings of the 5th international conference on Emerging intelligent computing technology and applications
ICCSA'07 Proceedings of the 2007 international conference on Computational science and Its applications - Volume Part II
Fuzzy-based determination method for redistributing keys in sensor networks
ICACT'10 Proceedings of the 12th international conference on Advanced communication technology
Key re-dissemination for maintaining detection power in sensor networks
ICACT'10 Proceedings of the 12th international conference on Advanced communication technology
Fuzzy efficient MAC length determination method for commutative cipher based filtering
ICACT'10 Proceedings of the 12th international conference on Advanced communication technology
Hop by hop on demand path selection method for sensor networks
ICACT'10 Proceedings of the 12th international conference on Advanced communication technology
A secure routing scheme for mobile wireless sensor networks
Artificial Life and Robotics
Fuzzy based key re-distribution period determination method in wireless sensor networks
ICIC'10 Proceedings of the Advanced intelligent computing theories and applications, and 6th international conference on Intelligent computing
Efficient key dissemination method using fuzzy logic based dynamic en-route filtering
ICIC'10 Proceedings of the Advanced intelligent computing theories and applications, and 6th international conference on Intelligent computing
An immunity-based scheme for statistical en-route filtering in wireless sensor networks
KES'10 Proceedings of the 14th international conference on Knowledge-based and intelligent information and engineering systems: Part III
Detect DDoS flooding attacks in mobile ad hoc networks
International Journal of Security and Networks
Intrusion-resilient integrity in data-centric unattended WSNs
Pervasive and Mobile Computing
An analysis of immunity-based statistical en-route filtering in wireless sensor networks
Proceedings of the International Conference on Management of Emergent Digital EcoSystems
MICAI'06 Proceedings of the 5th Mexican international conference on Artificial Intelligence
Performance evaluation of immunity-based statistical en-route filtering in wireless sensor networks
Artificial Life and Robotics
Distributed user access control in sensor networks
DCOSS'06 Proceedings of the Second IEEE international conference on Distributed Computing in Sensor Systems
Locating compromised sensor nodes through incremental hashing authentication
DCOSS'06 Proceedings of the Second IEEE international conference on Distributed Computing in Sensor Systems
Data authenticity and availability in multihop wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Multi-Dimensional resilient statistical en-route filtering in wireless sensor networks
GPC'10 Proceedings of the 5th international conference on Advances in Grid and Pervasive Computing
Energy Efficiency Routing with Node Compromised Resistance in Wireless Sensor Networks
Mobile Networks and Applications
Key inheritance-based false data filtering scheme in wireless sensor networks
ICDCIT'06 Proceedings of the Third international conference on Distributed Computing and Internet Technology
Designing an efficient PCA based data model for wireless sensor networks
Proceedings of the 1st International Conference on Wireless Technologies for Humanitarian Relief
Advanced path selection method for detection of false reports in statistical filtering based WSNs
WISA'11 Proceedings of the 12th international conference on Information Security Applications
Fuzzy-based reliable data delivery for countering selective forwarding in sensor networks
UIC'07 Proceedings of the 4th international conference on Ubiquitous Intelligence and Computing
Securing sensor reports in wireless sensor networks
Euro-Par'07 Proceedings of the 13th international Euro-Par conference on Parallel Processing
A secure energy-efficient routing protocol for WSN
ISPA'07 Proceedings of the 5th international conference on Parallel and Distributed Processing and Applications
Wireless Personal Communications: An International Journal
On effective data aggregation techniques in host-based intrusion detection in MANET
International Journal of Security and Networks
Hi-index | 0.08 |
In a large-scale sensor network individual sensors are subject to security compromises. A compromised node can be used to inject bogus sensing reports. If undetected, these bogus reports would be forwarded to the data collection point (i.e., the sink). Such attacks by compromised nodes can result in not only false alarms but also the depletion of the finite amount of energy in a battery powered network. In this paper, we present a statistical en-route filtering (SEF) mechanism to detect and drop false reports during the forwarding process. Assuming that the same event can be detected by multiple sensors, in SEF each of the detecting sensors generates a keyed message authentication code (MAC) and multiple MACs are attached to the event report. As the report is forwarded, each node along the way verifies the correctness of the MAC's probabilistically and drops those with invalid MACs. SEF exploits the network scale to filter out false reports through collective decision-making by multiple detecting nodes and collective false detection by multiple forwarding nodes. We have evaluated SEF's feasibility and performance through analysis, simulation, and implementation. Our results show that SEF can be implemented efficiently in sensor nodes as small as Mica2. It can drop up to 70% of bogus reports injected by a compromised node within five hops, and reduce energy consumption by 65% or more in many cases.