CFP last date
20 December 2024
Reseach Article

Detecting False Data in Wireless Sensor Network using Efficient Becan Scheme

by S. Sajithabanu, M. Durairaj
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 43 - Number 18
Year of Publication: 2012
Authors: S. Sajithabanu, M. Durairaj
10.5120/6205-8763

S. Sajithabanu, M. Durairaj . Detecting False Data in Wireless Sensor Network using Efficient Becan Scheme. International Journal of Computer Applications. 43, 18 ( April 2012), 20-31. DOI=10.5120/6205-8763

@article{ 10.5120/6205-8763,
author = { S. Sajithabanu, M. Durairaj },
title = { Detecting False Data in Wireless Sensor Network using Efficient Becan Scheme },
journal = { International Journal of Computer Applications },
issue_date = { April 2012 },
volume = { 43 },
number = { 18 },
month = { April },
year = { 2012 },
issn = { 0975-8887 },
pages = { 20-31 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume43/number18/6205-8763/ },
doi = { 10.5120/6205-8763 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:33:45.670687+05:30
%A S. Sajithabanu
%A M. Durairaj
%T Detecting False Data in Wireless Sensor Network using Efficient Becan Scheme
%J International Journal of Computer Applications
%@ 0975-8887
%V 43
%N 18
%P 20-31
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Wireless sensor networks (WSNs), as an emerging technology face numerous challenges. Sensor nodes are usually resource constrained and also vulnerable to physical attacks or node compromises. As the projected applications for wireless sensor networks range from smart applications such as traffic monitoring to critical military applications such as measuring levels of gas concentration in battle fields, security in sensor networks becomes a prime concern. In sensitive applications, it becomes imperative to continuously monitor the transient state of the system rather than steady state observations and take requisite preventive and corrective actions. Generally, the networks are prone to be attacked by adversaries who intend to disrupt the functioning of the system by compromising the sensor nodes and injecting false data into the network. So it is important to shield the sensor network from false data injection attacks. In this work, it is proposed to use a novel bandwidth-efficient cooperative authentication (BECAN) scheme for filtering injected false data based on Bloom Filter.

References
  1. Rongxing Lu, Xiaodong Lin, Haojin Zhu, Xiaohui Liang, and Xuemin (Sherman) Shen, "BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks", IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 1, January 2012.
  2. J. Hill, R. Szewczyk, A, Woo, S. Hollar, D. Culler, and K. Pister, System rchitecture Directions for Networked Sensors, SPLOS, November 2000.
  3. Nirupama Bulusu, Sanjay Jha, "Wireless Sensor Networks, A Systems Perspective",ISBN:1-58053-867-3, 2005.
  4. R. Szewczky, A. Mainwaring, J. Anderson, and D. Culler, "An Analysis of a Large Scale Habit Monitoring Application," Proc. Second ACM Int'l Conf. Embedded Networked Sensor Systems (Sensys '04), 2004.
  5. L. Eschenauer and V. D. Gligor, "A Key-Management Scheme for Distributed Sensor Networks," Proc. Ninth ACM Conf. Computer and Comm. Security (CCS '02), 2002.
  6. R. Lu, X. Lin, C. Zhang, H. Zhu, P. Ho, and X. Shen, "AICN: An Efficient Algorithm to Identify Compromised Nodes in Wireless Sensor Network," Proc. IEEE Int'l Conf. Comm. (ICC '08), May 2008.
  7. L. Zhou and C. Ravishankar, "A Fault Localized Scheme for False Report Filtering in Sensor Networks," Proc. Int'l Conf. Pervasive Services, (ICPS '05), pp. 59-68, July 2005
  8. F. Ye, H. Luo, S. Lu, and L. Zhang, "Statistical En-Route Detection and Filtering of Injected False Data in Sensor Networks," Proc. IEEE INFOCOM '04, Mar. 2004.
  9. S. Zhu, S. Setia, S. Jajodia, and P. Ning, "An Interleaved Hop-by- Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks," Proc. IEEE Symp. Security and Privacy, 2004.
  10. H. Yang, F. Ye, Y. Yuan, S. Lu, and W. Arbaugh, "Toward Resilient Security in Wireless Sensor Networks," Proc. Sixth ACM Int'l Symp. Mobile Ad Hoc Networking and Computing (MobiHoc '05), pp. 34-45, 2005.
  11. K. Ren, W. Lou, and Y. Zhang, "LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks," Proc. IEEE INFOCOM '06, Apr. 2006.
  12. Y. Zhang, W. Liu, W. Lou, and Y. Fang, "Location-Based Compromise-Tolerant Security Mechanisms for Wireless Sensor Networks," IEEE J. Selected Areas in Comm. , vol. 24, no. 2, pp. 247- 260, Feb. 2006.
  13. R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor, and B. Pinkas, "Multicast Security: A Taxonomy and Some Efficient Constructions," Proc. IEEE INFOCOM '99, pp. 708-716, Mar. 1999.
  14. Z. Benenson, C. Freiling, E. Hammerschmidt, S. Lucks, and L. Pimenidis, "Authenticated Query Flooding in Sensor Networks,"Security and Privacy in Dynamic Environments, Springer, pp. 38-49,July 2006.
  15. H. Chan, A. Perrig, and D. Song, "Random Key Predistribution Schemes for Sensor Networks," in IEEE Symposium on Security and Privacy,2003.
  16. "Network Simulators", [Online] Available: http://www. isi. edu/nsnam/ns/
  17. "Simulating Sensor Networks in NS-2",[Online] Available:http://nile. wpi. edu/NS/
  18. Gowrishankar, S. Subir Kumar Sarkar. Basavaraju, T. G. (2009),"Scenario Based Simulation Study of Ad hoc Routing Protocol's behavior in Wireless Sensor Networks", Proceedings International Conference on Future Computer and Communication, Vol. 5, No. 4, July 2009, pp 527- 532.
  19. Usop, N. S. M. Azizol Abdullah. Abidin, A. F. A. (2009),"Performance Evaluation of AODV, DSDV & DSR Routing Protocol in Grid Environment", International Journal of Computer Science and Network Security (IJCSNS), Vol. 9 No. 7, pp 261-268.
Index Terms

Computer Science
Information Sciences

Keywords

Wireless Sensor Networks Bandwidth Injecting False Data Attack Bloom Filter