TY - GEN
T1 - An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks
AU - Zhu, Sencun
AU - Setia, Sanjeev
AU - Jajodia, Sushil
AU - Ning, Peng
PY - 2004
Y1 - 2004
N2 - Sensor networks are often deployed in unattended environments, thus leaving these networks vulnerable to false data injection attacks in which an adversary injects false data into the network with the goal of deceiving the base station or depleting the resources of the relaying nodes. Standard authentication mechanisms cannot prevent this attack if the adversary has compromised one or a small number of sensor nodes. In this paper, we present an interleaved hop-by-hop authentication scheme that guarantees that the base station will detect any injected false data packets when no more than a certain number t nodes are compromised. Further, our scheme provides an upper bound B for the number of hops that a false data packet could be forwarded before it is detected and dropped, given that there are up to t colluding compromised nodes. We show that in the worst case B is O(t 2). Through performance analysis, we show that our scheme is efficient with respect to the security it provides, and it also allows a tradeoff between security and performance.
AB - Sensor networks are often deployed in unattended environments, thus leaving these networks vulnerable to false data injection attacks in which an adversary injects false data into the network with the goal of deceiving the base station or depleting the resources of the relaying nodes. Standard authentication mechanisms cannot prevent this attack if the adversary has compromised one or a small number of sensor nodes. In this paper, we present an interleaved hop-by-hop authentication scheme that guarantees that the base station will detect any injected false data packets when no more than a certain number t nodes are compromised. Further, our scheme provides an upper bound B for the number of hops that a false data packet could be forwarded before it is detected and dropped, given that there are up to t colluding compromised nodes. We show that in the worst case B is O(t 2). Through performance analysis, we show that our scheme is efficient with respect to the security it provides, and it also allows a tradeoff between security and performance.
UR - http://www.scopus.com/inward/record.url?scp=3543056512&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=3543056512&partnerID=8YFLogxK
M3 - Conference contribution
AN - SCOPUS:3543056512
SN - 0769521363
SN - 9780769521367
T3 - Proceedings - IEEE Symposium on Security and Privacy
SP - 259
EP - 271
BT - Proceedings - IEEE Symposium on Security and Privacy
T2 - Proceedings - 2004 IEEE Symposium on Security and Privacy
Y2 - 9 May 2004 through 12 May 2004
ER -