False Data Detection in Wireless Sensor Networks via Merkle Hash Trees
Large-scale wireless sensor networks provide economical and viable solutions to many monitoring and tracking problems. However, practical deployment of wireless sensor networks introduces problems that do not occur in traditional networks. For example, individual sensor nodes are prone to security c...
Main Author: | |
---|---|
Format: | Article |
Language: | English |
Published: |
Suleyman Demirel University
2009-04-01
|
Series: | Süleyman Demirel Üniversitesi Fen Bilimleri Enstitüsü Dergisi |
Online Access: | http://dergipark.ulakbim.gov.tr/sdufenbed/article/view/1089000879 |
id |
doaj-545f1a1e9de942a9a763858349067900 |
---|---|
record_format |
Article |
spelling |
doaj-545f1a1e9de942a9a7638583490679002020-11-25T00:44:46ZengSuleyman Demirel UniversitySüleyman Demirel Üniversitesi Fen Bilimleri Enstitüsü Dergisi1308-65292009-04-0111310.19113/sdufbed.466361089001146False Data Detection in Wireless Sensor Networks via Merkle Hash TreesSuat ÖZDEMİRLarge-scale wireless sensor networks provide economical and viable solutions to many monitoring and tracking problems. However, practical deployment of wireless sensor networks introduces problems that do not occur in traditional networks. For example, individual sensor nodes are prone to security compromises. Moreover, compromised nodes can inject false sensing reports into the network. If undetected, false data injection attacks may deceive the base station and deplete the limited energy resources of relaying sensor nodes. Standard data authentication schemes cannot prevent these attacks if there exists more than one compromised node in the network. In this paper, we present a collaborative data authentication protocol that detects false data injection attacks. In the proposed protocol, false data injected by less than n compromised nodes are detected and eliminated by constructing consecutive Merkle Hash Trees (MHT) between the source node and the base station. The security and performance analysis show that the proposed protocol is able to detect false data injected by less than n compromised nodes and incurs less resource consumption compared to previous false data detection schemes.http://dergipark.ulakbim.gov.tr/sdufenbed/article/view/1089000879 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Suat ÖZDEMİR |
spellingShingle |
Suat ÖZDEMİR False Data Detection in Wireless Sensor Networks via Merkle Hash Trees Süleyman Demirel Üniversitesi Fen Bilimleri Enstitüsü Dergisi |
author_facet |
Suat ÖZDEMİR |
author_sort |
Suat ÖZDEMİR |
title |
False Data Detection in Wireless Sensor Networks via Merkle Hash Trees |
title_short |
False Data Detection in Wireless Sensor Networks via Merkle Hash Trees |
title_full |
False Data Detection in Wireless Sensor Networks via Merkle Hash Trees |
title_fullStr |
False Data Detection in Wireless Sensor Networks via Merkle Hash Trees |
title_full_unstemmed |
False Data Detection in Wireless Sensor Networks via Merkle Hash Trees |
title_sort |
false data detection in wireless sensor networks via merkle hash trees |
publisher |
Suleyman Demirel University |
series |
Süleyman Demirel Üniversitesi Fen Bilimleri Enstitüsü Dergisi |
issn |
1308-6529 |
publishDate |
2009-04-01 |
description |
Large-scale wireless sensor networks provide economical and viable solutions to many monitoring and tracking problems. However, practical deployment of wireless sensor networks introduces problems that do not occur in traditional networks. For example, individual sensor nodes are prone to security compromises. Moreover, compromised nodes can inject false sensing reports into the network. If undetected, false data injection attacks may deceive the base station and deplete the limited energy resources of relaying sensor nodes. Standard data authentication schemes cannot prevent these attacks if there exists more than one compromised node in the network. In this paper, we present a collaborative data authentication protocol that detects false data injection attacks. In the proposed protocol, false data injected by less than n compromised nodes are detected and eliminated by constructing consecutive Merkle Hash Trees (MHT) between the source node and the base station. The security and performance analysis show that the proposed protocol is able to detect false data injected by less than n compromised nodes and incurs less resource consumption compared to previous false data detection schemes. |
url |
http://dergipark.ulakbim.gov.tr/sdufenbed/article/view/1089000879 |
work_keys_str_mv |
AT suatozdemir falsedatadetectioninwirelesssensornetworksviamerklehashtrees |
_version_ |
1725273551990161408 |