Sunteți pe pagina 1din 6

FILTERING FALSE DATA INJECTION IN WIRELESS

SENSOR NETWORKS
DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING
AUDISANKARA COLLEGE OF ENGINEERING AND TECHNOLOGY
BY
B.MAHESH KUMAR & B.HARI KRISHNA
(maheshkumar4india@gmail.com)
(harikrishnab422@gmail.com)

Abstract proposed method against false data injection


attacks will be presented.
In sensor networks, nodes can be easily
compromised by an adversary because of 1. Introduction
hostile environments. An adversary may use A sensor network is composed of a large
compromised nodes to inject false reports number of sensor nodes that are densely
into the network. The dynamic en-route deployed. These nodes have the ability to
communicate either among each neighbors
scheme for filtering false data injection can
or directly to the base station. Sensor nodes
detect and drop such false reports during the often have limited computation and
forwarding phase. In this scheme, choosing communication resources and battery power.
Sensor nodes are affected by physical
a threshold value is important, as it trades
attacks, potentially compromising the
off between security power and energy sensor’s cryptographic keys, since they are
consumption. Thus, we should choose the deployed in hostile environments. An
adversary may use compromised nodes to
threshold value such that it provides
inject false reports into the network (Fig. 1).
sufficient resilience, yet be small enough to False reports may not only cause false
conserve energy. We present a fuzzy-based alarms, but also the depletion of the serious
threshold determining method for the amount of energy in each forwarding node.
To minimize critical damage, false reports
dynamic en-route scheme for filtering false should be dropped en-route as early as
data injection in wireless sensor networks. possible and the few elusive ones should be
The base station periodically determines a rejected at the base station. The early
dropping of false reports leads to significant
threshold value with a fuzzy rule-based
energy saving.
system. The number of cluster nodes, the
Various security solutions have been
value of the key dissemination limit, and the
proposed to detect and drop false reports.
distance from the base station to each cluster Dynamic En-Route scheme for Filtering
are used to determine the threshold value. false data injection (DEF) is one of these
solutions. In DEF the choice of a threshold
The resilience and energy efficiency of the
value is important, since it trades off
security against overhead. A large threshold network consists of a large number of
value allows false reports to be more easily clusters). In DEF, a legitimate report can be
detected, but it consumes more energy in the verified by MACs generated by a sensing
forwarding. In contrast, a small threshold node. DEF consists of three phases: pre-
may consume less energy, but will cause deployment phase, post-deployment phase,
inefficient filtering or may even be useless, and filtering phase. In the pre-deployment
if a large number of nodes have been phase, each node is preloaded with a seed
compromised. We should choose the authentication key and secret keys (l + 1)
threshold value such that it provides randomly picked from a global key pool. In
sufficient resilience, while still conserving the post-deployment phase, every node in
energy. the cluster forwards encrypted
authentication keys by using its l+1 secret
In this paper, we propose a threshold keys to its cluster head (Fig. 2(a)), and then
determining method based on fuzzy logic. A each cluster head disseminates the encrypted
fuzzy rule-based system is exploited to authentication keys of all nodes in that
determine the threshold value that represents cluster to the neighbor node. These keys can
the number of the message authentication only be forwarded at most key dissemination
code (MAC). It considers the number of limiting hops (Fig. 2(b)). Each receiving
nodes in the cluster, the key dissemination node decrypts and stores the authentication
limiting value, and the distance from the key if it has the corresponding key.
base station (BS) to each cluster. Our
proposed method determines the effective
threshold value through the fuzzy rule-based
system.

Figure1. False data injection attacks.

2. DEF Overview

Compared to existing filtering schemes,


DEF is better in dealing with the dynamic
topology of sensor networks. It outperforms
them in terms of energy efficiency, Figure2. Key dissemination and en-route filtering in
especially for large sensor networks (i.e., a DEF.
In the filtering phase, DEF can detect a false
report and drop it (Fig. 2(c)). After
disseminating the authentication keys, a
cluster head aggregates reports encrypted by
MACs generated by its cluster nodes, and
sends them to a neighbor node. Each report
should contain t distinct MACs of those
cluster nodes, where t is a security threshold.

Suppose that an adversary has compromised


a cluster head as shown in Fig. 2(c). She can
inject false reports through the cluster head.
Figure3. Overview of proposed method.
The false reports may be forwarded by v1
and v2 since she has compromised k5 and v2 3.2 Overview
does not have an authentication key shared
with a cluster node. However, the false In the proposed method, the BS periodically
reports may be detected and dropped by determines the threshold value (SP) using a
node v3 since she may not have k1. fuzzy rule-based system (Fig. 3(a)). The
number of cluster nodes (CN), the value of
3. Threshold Determining Method Based the key dissemination limit (KDL), and
on Fuzzy Logic estimated distance from the BS to each
cluster (DBS) are used to determine SP. If
3.1 Assumptions
the determined SP differs from the current
We assume that sensor nodes form a number value, the BS broadcasts the determined
of clusters after deployment. In a cluster, value to all the corresponding nodes in the
one node is elected as the cluster head. To network (Fig. 3(b)).
balance energy consumption, all nodes of
3.3 Input Parameters
the same cluster may take turns playing the
role of cluster head. Since nodes are not In DEF, SP should be smaller than the
equipped with tamper-resistant hardware, number of cluster nodes. The MACs are
they can be compromised by adversaries and generated by cluster nodes using their
be used to inject false reports. But they authentication keys. If each cluster consists
cannot compromise the BS. We also assume of five nodes, a report attached by them can
that the BS can know the average number of contain up to five MACs. Therefore, we
cluster nodes, the estimated distance from have to consider the number of cluster nodes
the BS to each cluster, and energy to determine SP. Note that the number of
consumption. Also, we assume that the BS cluster nodes can be changed according to
has all the authentication keys and thus can the node’s state (dying or replaced).
reject a few elusive reports. We further
assume that the BS has a mechanism to A large KDL value diffuses a large number
authenticate broadcast messages and every of authentication keys through the network.
node can verify the broadcast messages. It results in many nodes that have the
authentication key, and raises the probability
of filtering out false reports. Thus, even a
small SP can provide sufficient detection • CN = {VS (Very Small), S (Small),
power. On the other hand, we should choose M (Medium), L(Large), VL (Very
a large SP if authentication keys are Large)}
disseminated to only a few nodes (i.e., KDL
is very small). Thus, we also have to • KDL = {N (Narrow), M (Medium),
consider the KDL value to determine SP. W (Wide)}

Sensor nodes near the BS consume less • DBS = {N (Near), AR (Around),


energy than other nodes in forwarding M (Medium), D(Distant), VD (Vary
reports to the BS. In the case of undetected Distant)}
false reports with a small SP, the eluded The output parameter of the fuzzy logic is
reports generated near the BS (Fig. 4(a)) SP = {VS, S, M, L, VL}, represented by the
have smaller travel hops than those membership functions as shown in Fig. 5.
generated by a compromised node in a
cluster further away from the BS (Fig. 4(b)).
Thus, we have to adjust SP according to
DBS to conserve energy and reduce the
overhead of diffusion messages.

Figure5. Fuzzy membership functions.

Figure4. Energy drain according to distance.


Table1. Fuzzy if-then rules
3.4 Fuzzy Logic Design
In our method, if CN is VL, KDL is N, and
Fig. 4 illustrates the membership functions DBS is N, then we may decrease SP to
of these fuzzy logic input parameters. The conserve energy (Rule 1). Forwarding nodes
labels of the fuzzy variables are represented do not need to verify such reports. They may
as follows: be detected by the BS immediately. In
contrast, if DBS is VD, we should set a
higher SP to raise the security (Rule 5). The
fuzzy rule-based system determines SP
according to DBS to conserve energy and
improve security.

4. Simulation Results

The original DEF (SP =2, 4, and 6) is


compared with the threshold determining
method through the fuzzy rule-based system.
In the original DEF, the key dissemination
limiting value is fixed during the post-
deployment phase. In the simulation each
cluster consists of 10 nodes. Each node Figure7. Portion of filtered reports ratio.
consumes 16.25, 12.5 µJ to transmit/receive
Fig. 7 shows the filtering out ratio caused by
a byte and each MAC generation consumes
false report. Some of the parts (DBS = 5 and
15 µJ. The size of the original report is 24
9) show our proposed method to be less
bytes, and MAC is 1 byte. There are 1,000
effective than the original DEF with 6
secret keys in the global key pool.
MACs (filled triangles). However, the
difference between the original DEF with 6
MACs and our proposed method is very
small and more effective in other scenarios
(DBS = 13 and 17). Most areas distant from
the BS filter fewer than others close to the
BS (Fig. 7). This wastes energy, since false
reports travel into the sensor network. Thus,
our proposed method determines a large SP
(Rule 4 and 5 in Table 1) when the node is
deployed in a cluster away from the BS in
order to increase security and conserve
Figure6. Average energy consumption per false energy. Therefore, our proposed method can
report. conserve energy by dropping false reports at
the area (DBS = 13 and 17).
Fig.6 shows the average energy
consumption caused by false reports when
CN = 10, KDL = 2, DBS = {5, 9, 13, 17}.
Energy consumption caused by elusive
reports depends on DBS. If elusive reports
occur when DBS is large, more energy is
consumed than DBS with small values. Our
proposed method determines SP according
to DBS (Rule 1, 2 and 4 in Table 1). As
shown in Fig. 6, our proposed method
(empty circles) performs more effectively in
conserving energy than the original DEF.
Figure8. Average traveled hops per false report.
Fig. 8 shows the average traveled hops per  Ye F, Luo H, Lu S. Statistical En-
false reports. As discussed previously, false Route Filtering of Injected False
reports cause energy drain. Our proposed Data in Sensor Networks. IEEE J.
method shows fewer travel hops than the Sel. Area Comm., 2005, 23(4): 839-
original DEF (with MACs 2, 4, and 6), thus 850.
conserving energy.
 Przydatek I, Song D, Perrig A. SIA:
5. Conclusion Secure Information Aggregation in
Sensor Networks. In Proc. SenSys,
In DEF, SP is important since it trades off
2003, pp.255-265.
security and energy consumption. In this
paper, we propose a threshold determining
method based on fuzzy logic. In our
proposed method, SP is determined based on
CN, KDL, and DBS. Of the input
parameters, DBS is especially important in
determining SP, since eluded reports
generated distant from the BS travel more
hops into the network (Fig. 4 (b)) than from
nodes in a cluster near the BS. This leads to
energy waste. As shown by simulation, our
proposed method shows effective
performance, balancing energy conservation
and security.

References

 Yu Z, Guan Y. A Dynamic En-route


Scheme for Filtering False Data
Injection in Wireless Sensor
Networks. In Proc. SenSys, 2005,
pp.294-295.

 Zhu S, Setia S, Jajodia S,


Ning P. An Interleaved Hop-by-Hop
Authentication Scheme for Filtering
of Injected False Data in Sensor
Networks. In Proc. S&P, 2004,
pp.259-271.

 Yang H, Lu S. Commutative Cipher


Based En-Route Filtering in Wireless
Sensor Networks. In Proc. VTC,
2003, pp.1223-1227.

S-ar putea să vă placă și