False Data Detection in Wireless Sensor Networks via Merkle Hash Trees

Large-scale wireless sensor networks provide economical and viable solutions to many monitoring and tracking problems. However, practical deployment of wireless sensor networks introduces problems that do not occur in traditional networks. For example, individual sensor nodes are prone to security c...

Full description

Bibliographic Details
Main Author: Suat ÖZDEMİR
Format: Article
Language:English
Published: Suleyman Demirel University 2009-04-01
Series:Süleyman Demirel Üniversitesi Fen Bilimleri Enstitüsü Dergisi
Online Access:http://dergipark.ulakbim.gov.tr/sdufenbed/article/view/1089000879
id doaj-545f1a1e9de942a9a763858349067900
record_format Article
spelling doaj-545f1a1e9de942a9a7638583490679002020-11-25T00:44:46ZengSuleyman Demirel UniversitySüleyman Demirel Üniversitesi Fen Bilimleri Enstitüsü Dergisi1308-65292009-04-0111310.19113/sdufbed.466361089001146False Data Detection in Wireless Sensor Networks via Merkle Hash TreesSuat ÖZDEMİRLarge-scale wireless sensor networks provide economical and viable solutions to many monitoring and tracking problems. However, practical deployment of wireless sensor networks introduces problems that do not occur in traditional networks. For example, individual sensor nodes are prone to security compromises. Moreover, compromised nodes can inject false sensing reports into the network. If undetected, false data injection attacks may deceive the base station and deplete the limited energy resources of relaying sensor nodes. Standard data authentication schemes cannot prevent these attacks if there exists more than one compromised node in the network. In this paper, we present a collaborative data authentication protocol that detects false data injection attacks. In the proposed protocol, false data injected by less than n compromised nodes are detected and eliminated by constructing consecutive Merkle Hash Trees (MHT) between the source node and the base station. The security and performance analysis show that the proposed protocol is able to detect false data injected by less than n compromised nodes and incurs less resource consumption compared to previous false data detection schemes.http://dergipark.ulakbim.gov.tr/sdufenbed/article/view/1089000879
collection DOAJ
language English
format Article
sources DOAJ
author Suat ÖZDEMİR
spellingShingle Suat ÖZDEMİR
False Data Detection in Wireless Sensor Networks via Merkle Hash Trees
Süleyman Demirel Üniversitesi Fen Bilimleri Enstitüsü Dergisi
author_facet Suat ÖZDEMİR
author_sort Suat ÖZDEMİR
title False Data Detection in Wireless Sensor Networks via Merkle Hash Trees
title_short False Data Detection in Wireless Sensor Networks via Merkle Hash Trees
title_full False Data Detection in Wireless Sensor Networks via Merkle Hash Trees
title_fullStr False Data Detection in Wireless Sensor Networks via Merkle Hash Trees
title_full_unstemmed False Data Detection in Wireless Sensor Networks via Merkle Hash Trees
title_sort false data detection in wireless sensor networks via merkle hash trees
publisher Suleyman Demirel University
series Süleyman Demirel Üniversitesi Fen Bilimleri Enstitüsü Dergisi
issn 1308-6529
publishDate 2009-04-01
description Large-scale wireless sensor networks provide economical and viable solutions to many monitoring and tracking problems. However, practical deployment of wireless sensor networks introduces problems that do not occur in traditional networks. For example, individual sensor nodes are prone to security compromises. Moreover, compromised nodes can inject false sensing reports into the network. If undetected, false data injection attacks may deceive the base station and deplete the limited energy resources of relaying sensor nodes. Standard data authentication schemes cannot prevent these attacks if there exists more than one compromised node in the network. In this paper, we present a collaborative data authentication protocol that detects false data injection attacks. In the proposed protocol, false data injected by less than n compromised nodes are detected and eliminated by constructing consecutive Merkle Hash Trees (MHT) between the source node and the base station. The security and performance analysis show that the proposed protocol is able to detect false data injected by less than n compromised nodes and incurs less resource consumption compared to previous false data detection schemes.
url http://dergipark.ulakbim.gov.tr/sdufenbed/article/view/1089000879
work_keys_str_mv AT suatozdemir falsedatadetectioninwirelesssensornetworksviamerklehashtrees
_version_ 1725273551990161408