DocumentCode
609754
Title
EFBV: En-Route Filtering Based Batch Verification scheme for false data injection attack in wireless sensor networks
Author
Euodial, A. ; Beryl Princess, P.J.
Author_Institution
Comput. Sci. & Eng., SCAD Coll. of Eng. & Technol., Tirunelveli, India
fYear
2013
fDate
14-15 March 2013
Firstpage
1
Lastpage
5
Abstract
Formal specifications have a variety of applications, including testing, maintenance, optimization, refactoring, documentation, and program repair. However, such specifications are difficult for human programmers to produce and verify manually, and existing automatic specification miners that discover two-state temporal properties have prohibitively high false positive rates, Wireless Sensor Networks are usually deployed at unattended or hostile environments. So they are very vulnerable to injecting false data attack. An adversary could compromise a sensor node accesses all stored keying materials and inject false data causing energy wasted in en-route nodes. In this paper, we propose En-Route Filtering Based Batch Verification (EFBV) scheme to find gang injecting false data attack and filter the false data. By batch verification of reports the false data can be identified and filtered easily. With the proposed mechanism, injected bogus data can be early detected and filtered by En-Route sensor nodes. Thus, it can be discover the intruder before it reaches the sink. The proposed EFBV scheme could be effectively saving energy and avoid sink overhead. It also makes possible to thwart the false data even if network contains at least one uncompromised neighboring node. The proposed scheme achieves most energy efficient, the high filtering probability, scalability and reliability, reduce traffic overhead.
Keywords
formal specification; probability; security of data; wireless sensor networks; EFBV scheme; en-route filtering based batch verification scheme; false data injection attack; formal specifications; high filtering probability; injected bogus data; sink overhead; traffic overhead reduction; wireless sensor networks; Authentication; Information filters; Routing; Wireless sensor networks; Batch verification; Bipartite key pair; Gang Injected false data attack; Message Authentication code;
fLanguage
English
Publisher
ieee
Conference_Titel
Green High Performance Computing (ICGHPC), 2013 IEEE International Conference on
Conference_Location
Nagercoil
Print_ISBN
978-1-4673-2592-9
Type
conf
DOI
10.1109/ICGHPC.2013.6533935
Filename
6533935
Link To Document