False data filtering scheme based on trust management mechanism in wireless sensor networks
CAO Yanhua1,ZHANG Zhiming1,YU Min2
1. School of Software, Jiangxi Normal University, Nanchang Jiangxi 330022, China;
2. Journal of Jiangxi Normal University, Jiangxi Normal University, Nanchang Jiangxi 330027, China
In the traditional false data filtering schemes of Wireless Sensor Networks (WSN), only the false data reports are filtered, while the compromised nodes still can continuously inject false data to WSN which wastes network resources. In order to cut off the source of false data generating, a new false data filtering scheme based on trust management mechanism was proposed. The conspiracy forged false data generated from multiple captured nodes were limited within a cluster by using clustering method, then the trust management mechanism was used to detect whether the node was compromised, hence isolated the compromised node. The analysis results show that the proposed scheme can not only filter false data effectively, but also isolate compromised nodes, and has a strong ability of tolerating compromised nodes.
曹燕华 章志明 余敏. 基于信任管理机制的无线传感器网络虚假数据过滤方案[J]. 计算机应用, 2014, 34(6): 1567-1572.
CAO Yanhua ZHANG Zhiming YU Min. False data filtering scheme based on trust management mechanism in wireless sensor networks. Journal of Computer Applications, 2014, 34(6): 1567-1572.
YE F, LUO H, ZHANG L. Statistical en-route filtering of injected false data in sensor networks[C]// Proceedings of the 23th Annual Joint Conference of the IEEE Computer and Communications Societies. Piscataway: IEEE Press, 2005:839-850.
[2]
ZHU S, SETIA S, JAJODIA S. An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks[C]// Proceedings of the 2004 IEEE Symposium on Security and Privacy. Piscataway: IEEE Press, 2004:259-271.
[3]
YU Z, GUAN Y. A dynamic en-route scheme for filtering false data injection in wireless sensor networks[C]// Proceedings of the 3rd International Conference on Embedded Networked Sensor Systems. Piscataway: IEEE Press, 2006:1-12.
[4]
LIU Z, WANG J. Geographical information based false report filtering scheme in wireless sensor networks[J]. Journal of Communications, 2012,33(2):156-163. (刘志雄,王建新. 传感器网络中一种基于地理位置的虚假数据过滤方案[J]. 通信学报,2012,33(2):156-163.)
[5]
YANG H, LU S. Commutative cipher based en-route filtering in wireless sensor networks[C]// VTC2004-Fall: Proceedings of the 2004 IEEE 60th Vehicular Technology Conference. Piscataway: IEEE Press, 2004:1223-1227.
[6]
REN K, LOU W, ZHANG Y. LEDS: providing location-aware end-to-end data security in wireless sensor networks[J]. IEEE Transactions on Mobile Computing, 2008,7(5):585-598.
[7]
YI Y, LIN Y, LI X, et al. False data filtering algorithm using cooperation watermarks for WSN [J]. Journal of Software, 2010,21(1):107-118. (易叶青,林亚平,李小龙,等. WSN中基于协作水印的虚假数据过滤算法[J]. 软件学报,2010,21(1):107-118.)
[8]
LIU Z, WANG J, ZHANG X. A false data filtering scheme using cluster-based organization in sensor networks[C]// Proceedings of the 2011 IEEE International Conference on Communications. Piscataway: IEEE Press, 2011:1-5.
[9]
YANG S, LIU P, YI Y. Robust authentication scheme for filtering false data in sensor networks[J]. Chinese Journal of Sensors and Actuators, 2008,21(5):858-864.(羊四清,刘平,易叶青. 传感器网络中一种过滤虚假数据的鲁棒认证机制[J]. 传感技术学报,2008,21(5):858-864.)
[10]
CHRISTOPH K, MARKUS S, KPATCHA B, et al. STEF: a secure ticket-based en-route filtering scheme for wireless sensor networks[C]// ARES 2007: Proceedings of the 2nd International Conference on Availability, Reliability and Security. Piscataway: IEEE Press, 2007:310-317.
[11]
LI F, WU J. A probabilistic voting-based filtering scheme in wireless sensor networks[C]// IWCMC 2006: Proceedings of the 2006 International Conference on Wireless Communications and Mobile Computing. New York: ACM Press, 2006:27-32.
[12]
ZHANG W, TRAN M, ZHU S, et al. A random perturbation-based pairwise key establishment scheme for sensor networks[C]// Proceedings of the 8th ACM International Symposium on Mobile Ad Hoc Networking and Computing. New York: ACM Press, 2007: 90-99.
[13]
ZHANG W, SUBRAMANIAN N, WANG G. Light-weight and compromise-resilient message authentication in sensor networks [C]// Proceedings of the 27th IEEE Computer and Communications Societies. Washington, DC: IEEE Computer Society, 2008:1418-1426.
[14]
MAO G, FIDAN B, ANDERSON B. Wireless sensor network localization techniques [J]. The International Journal of Computer and Telecommunications Networking, 2007,51(10):2529-2553.
[15]
PERRIG A, TYGAR J D, SONG D, et al. Efficient authentication and signing of multicast streams over lossy channels[C]// S&P 2000: Proceedings of the 2000 IEEE Symposium on Security and Privacy. Piscataway: IEEE Press, 2000: 56-73.
[16]
LI M, MIAO F, XIONG Y. WSN pre-distribution key management scheme based on cluster[J]. Computer Engineering, 2011,37(5): 1-4. (李明,苗付友,熊焰. 一种基于簇的WSN 预分配密钥管理机制[J]. 计算机工程,2011,37(5): 1-4.)
[17]
JING Q, TANG L, CHEN Z. Trust management in wireless sensor networks[J]. Journal of Software, 2008,19(7):1716-1730. (荆琦,唐礼勇,陈钟. 无线传感器网络中的信任管理[J]. 软件学报,2008,19(7):1716-1730.)