SEARCH WITHIN CONTENT
Citation Information : International Journal on Smart Sensing and Intelligent Systems. Volume 6, Issue 4, Pages 1,637-1,652, DOI: https://doi.org/10.21307/ijssis-2017-608
License : (CC BY-NC-ND 4.0)
Received Date : 20-April-2013 / Accepted: 26-July-2013 / Published Online: 05-September-2013
Sensor nodes may be deployed in hostile environments. An adversary may compromise the sensor nodes and inject false data into the network, which wastes scarce energy resources of the forwarding nodes. Existing schemes can effectively resist false data injection, but most of them do not consider the identifiers (IDs) attack, the en-route nodes check only the Message Authentication Codes (MACs) and do not verify the nodes identifiers (IDs) of the endorsing reports. In this paper, we propose a novel security routing protocol (KCEFP) based on one-way key chain. The proposed protocol can resist false data injection, replay and IDs attacks, and if the endorsement report is modified, the forwarding nodes can verify the endorsement report by the key chain, and filters out the fabricated packet right now. The security and performance analysis shows that our scheme provides a high security level and the energy savings significantly increasing with the number of fabricated report packet increasing.
 Ren F Y, Huang H N, Lin C, “Wireless sensor networks”, Journal of Software, 14(7), 2003,
 T. K. Dakhlallah, M. A. Zohdy and O.M. Salim， “ Type-2 Fuzzy Kalman Hybrid
Application for Dynamic Security Monitoring Systems based on Multiple Sensor Fusion”,
International Journal On Smart Sensing and Intelligent Systems, VOL. 4, NO. 4, 2011, pp. 607-
 CUI L, JU H L, MIAO Y, “Oveview of wireless sensor networks”, Journal of Computer
Researcher and Development, 42(1), 2005, pp. 163-174.
 Su Z, Lin C, Feng F J, et al, “Key management schemes and protocols for wireless sensor
networks”, Journal of Software, 18(5), 2007, pp. 1218-1231.
[5 S. Zhu, S. Setia, S. Jajodia, and P. Ning, “An interleaved hop-by-hop authentication scheme
for filtering false data injection in sensor networks”, In IEEE Proceedings of Symposium on
Security and Privacy, 2004, pp. 259-271.
 F. Ye, H. Luo, S. Lu, and L. Zhang, “Statistical en-route Filtering of injected false data in
sensor networks”, In:Proc. Of the 23rd annual Joint Conf. of the IEEE Computer and
Communications Societies (INFOCOM 2004), Hong Kong: IEEE Press, 2004, pp. 2446-2457.
 Vinod Shukla and Daji Qiao, “Distinguishing Data Transience from False Injection in Sensor
Networks”, 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc
Communications and Networks, SECON, 2007, pp. 41-50.
 Ren. Kui, Lou.Wenjing, Zhang.Yanchao, “LEDS: Providing location-aware end-to-end data security in wireless sensor networks”, IEEE Transactions on Mobile Computing, v7, n5, 2008, pp. 585-598.
 Ozdemir.Suat, Çam, Hasan, “Integration of false data detection with data aggregation and confidential transmission in wireless sensor networks”, IEEE/ACM Transactions on Networking, v18, n3, June 2010, pp. 736-749.
 Yu L，Li J, “Grouping- based Resilient Statistical En-route Filtering for Sensor Networks”, IEEE INFOCOM, 2009, pp. 1782-1790.
 LIU Zhi-xiong, WANG Jian-xin, “Geographical information based false report filtering scheme in wireless sensor networks”, Journal on Communications, 33(2), 2012, pp. 156-163.
 Zhiming Zhang, Changgen Jiang, Jiangang Deng, “A Secure Anonymous Path Routing Protocol for Wireless Sensor Networks”, 2010 IEEE International Conference on Wireless Communications, Networking and Information Security. Beijing, China, 25-27 June 2010, pp. 415- 418.
 Vasanth Iyer, Garimella Ram Murthy, and M.B. Srinivas, “Training Data Compression Algorithms and Reliability in Large Wireless Sensor Networks”, International Journal On Smart Sensing and Intelligent Systems,VOL. 1, NO. 4, 2008, pp. 912-921.
 Zhimin Li, Xin Xu, Zexiang Fan, “ Lightweight Trusted ID-based Signcryption Scheme for Wireless Sensor Networks”, International Journal On Smart Sensing and Intelligent Systems, VOL. 5, NO. 4, 2012, pp. 799 – 810.
 Zhang Zhiming, Chen Deqiao, Jiang Changgen, “A Hierarchical Secure Reliable Routing Protocol for Wireless Sensor Networks”, Sensor letters. vol.9, No.4, 2011, pp. 1561-1565.
 Jun XU , Xuehai ZHOU, Feng YANG, “ Traceback in wireless sensor networks with packet marking and logging”, Front. Comput. Sci. China, 5(3), 2011, pp. 308–315.
 Muhammad Shoaib Siddiqui, Syed Obaid Amin and Choong Seon Hong. “Hop-by-Hop Traceback in Wireless sensor networks,” IEEE communications letters.VOL.16, NO.2, February 2012, pp. 242-245.
 A. A. Abbasi and M. Younis, “A Survey on Clustering Algorithms for Wireless Sensor Networks”, In Computer Communications, 30(14), 2007, pp. 2826-2841.
 A. F. Salami, H. Bello-Salau, F. Anwar1, A. M. Aibinu, “A Novel Biased Energy Distribution (BED) Technique for Cluster-Based Routing in Wireless Sensor Networks”,
International Journal On Smart Sensing and Intelligent Systems, VOL. 4, NO. 2, 2011, pp. 161 – 173.