FALSE DATA FILTERING IN WIRELESS SENSOR NETWORKS

Publications

Share / Export Citation / Email / Print / Text size:

International Journal on Smart Sensing and Intelligent Systems

Professor Subhas Chandra Mukhopadhyay

Exeley Inc. (New York)

Subject: Computational Science & Engineering , Engineering, Electrical & Electronic

GET ALERTS

eISSN: 1178-5608

DESCRIPTION

4
Reader(s)
16
Visit(s)
0
Comment(s)
0
Share(s)

VOLUME 9 , ISSUE 4 (December 2016) > List of articles

FALSE DATA FILTERING IN WIRELESS SENSOR NETWORKS

Ze LUO * / Lingzhi ZHU * / Yunjie CHANG * / Qingyun LUO / Guixiang LI / Weisheng LIAO

Keywords : wireless sensor networks, false reports, out-dated packets, MAC.

Citation Information : International Journal on Smart Sensing and Intelligent Systems. Volume 9, Issue 4, Pages 1,795-1,821, DOI: https://doi.org/10.21307/ijssis-2017-940

License : (CC BY-NC-ND 4.0)

Received Date : 13-June-2016 / Accepted: 06-October-2016 / Published Online: 01-December-2016

ARTICLE

ABSTRACT

Wireless Sensor Networks (WSN) is often deployed in hostile environments, and the attacker can easily capture nodes to inject false data to the sensor network, which can cause serious results. This paper has studied various false data filtering techniques recently in wireless sensor network. Based on encryption technology, we have analyzed and compared the difference of various existing filtering strategies, then have pointed out the merits and demerits of them in detailed. At last, we give the developing trend of false data filtering, which provides a strong foundation for the further research.

Content not available PDF Share

FIGURES & TABLES

REFERENCES

[1] REN F Y, HUANG H N, LIN C. “Wireless sensor networks”, Journal of Software, Vol.14, No. 7, 2003, pp.1282-1291. [2] SU Z, LIN C, FENG F J, Ren FY. “Key Management Schemes and Protocols for Wireless sensor networks”. Journal of Software, Vol.18, No. 5, 2007, pp.1218-1231. [3] Ye, F., Luo, H., Lu, S., & Zhang, L. “Statistical en-route filtering of injected false data in sensor networks”. Joint Conference of the IEEE Computer & Communications Societies, Vol.4, 2004, pp.2446-2457 [4] Zhu, S., Setia, S., Jajodia, S., & Ning, P. “An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks”. Security & Privacy. Proceedings. IEEE Symposium on, 2004, pp.259-271. [5] Yu L, Li JZ. “Grouping-based resilient statistical en-route filtering for sensor networks”. Proceedings of 28th Annual Joint Conference of the IEEE Computer and Communications Societies, 2009, pp.1782-1790. [6] F. Yang, X.H. Zhou, Q.Y. Zhang, “Multi-Dimensional Resilient Statistical En-Route Filtering in Wireless Sensor Networks”, LNCS: Lecture Notes in Computer Science, 2010, pp. 130-139. [7] K. Naresh, K.P. Pradeep, K.S. Sathish, “An Active En-route Filtering Scheme for Information Reporting in Wireless Sensor Networks”, IJCSIT: International Journal of Computer Science and Information Technologies,Vol.2, No. 4,2011, 1812-1819. [8] MA M. “Resilience of sink filtering scheme in Wireless sensor networks”. Computer Communications, Vol.30, No1, 2006, pp.55-65. [9] F. Yang, X. H. Zhou, Q. Y. “Zhang. Multi-dimensional resilient statistical en-route filtering in Wireless sensor networks”. In: Proc. of LNCS’10, 2010, pp.130-139. [10] K. Naresh, K.P. PrDadeep, K.S. Sathish. “An Active En-route Filtering Scheme for Information Reporting in Wireless sensor networks”, International Journal of Computer Science and Information Technologies, Vol.2, No.4, 2011, pp.1812-1819.
[11] A. K. Bashir, S. J. Lim, C. S. Hussain, M. S. Park. “Energy Efficient In-network RFID Data Filtering Scheme in Wireless sensor networks”, IEEE Sensors Journal, Vol.11, No.7,2011, pp.7004-7021. [12] X. Y. Yang, J. Lin, P. Moulema, W. Yu, X.W. Fu, W. Zhao. “A Novel En-route Filtering Scheme against False Data Injection Attacks in Cyber-Physical Networked Systems”. In: Proc. of ICDCS’12, 2012, pp.92-101. [13] S.Zhu, S.Setia, S.Jajodia. “An interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks”, Proceeding IEEE symposium on Security and privacy, S&P’04, 2004, pp.259-271. [14] H.Yang, S.Lu. “Commutative Cipher Based En-route Filtering in Wireless sensor networks”, Vehicular Technology Conference, VTC’04, pp.1223-1227. [15] R.X. Lu, X.D. Lin, H.J. Zhu, X.H. Liang, X.M. Shen. “BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless sensor networks”, IEEE Transactions on Parallel and Distributed Systems, Vol.23, No.1, 2012, pp. 32-43. [16] K.Ren, W.Lou,Y.Zhang. “Providing location-aware End-to-end Data Security in Wireless sensor networks”. Proceedings of the IEEE Conference on Computing and Communicating, INFOCOM’06.2006, pp.585-598. [17] A.Perrig, R.Szewczyk, V.Wen, D.Culler, D.Tygar. “Spins: Security Protocols for Sensor Networks”. ACM Mobile Computing and Networking, MOBICOM’02, 2002, pp. 521-534. [18] S. Chen, A. Dunkels, F. O¨ sterlind, T. Voigt, and M. Johansson. “Time synchronization for predictable and secure data collection in Wireless sensor networks,” in Proceedings of The Sixth Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net 2007), Corfu, Greece, 2007.pp.165-172 [19] H.Wang, Q.Li. “PDF: A Public-key based False Data Filtering Scheme in Sensor Networks”, Proceedings of the International Conference on Wireless Algorithms, Systems and Applications, WASA’07, 2007, pp.129-138. [20] Yu L, Li JZ. “Grouping-based Resilient Statistical En-route Filtering for Sensor Networks”, Proceedings of 28th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM’09), 2009, pp.1782-1790. [21] Fan Y,Hao Y,Zhen L. “Catching’moles’in sensor networks”, Proc of the 27th International Conference on Distributed Computing Systems,Washington DC: IEEE Computer Society, 2007,pp.69-77. [22] Xu J, Qian H, Ying W, et al. “A deployment algorithm for mobile wireless sensor networks based on the electrostatic field theory”, The International Journal on Smart Sensing and Intelligent Systems, Vol.8, No.1, 2015, pp. 516-537. [23] Bai, Q., & Jin, C, “Image fusion and recognition based on compressed sensing theory”, International Journal on Smart Sensing & Intelligent Systems, Vol.8, No.1, 2015, pp. 159-180. [24] Feng Y, Xue-hai Z, Shu-guang Z. “Hierarchical traceback in wireless sensor networks”, Proc of the 4th International Conference on Wireless Communications, Networking and Mobile Computing, 2008, pp.1-4. [25] Qiao J, Liu S, Qi X, et al, “Transmission power control in wireless sensor networks under the minimum connected average node degree constraint”, The International Journal on Smart Sensing and Intelligent Systems, Vol.8, No. 1, 2015, pp.801-821.

EXTRA FILES

COMMENTS