Loading…
Interleaved hop-by-hop authentication against false data injection attacks in sensor networks
Sensor networks are often deployed in unattended environments, thus leaving these networks vulnerable to false data injection attacks in which an adversary injects false data into the network with the goal of deceiving the base station or depleting the resources of the relaying nodes. Standard authe...
Saved in:
Published in: | ACM transactions on sensor networks 2007-08, Vol.3 (3), p.14 |
---|---|
Main Authors: | , , , |
Format: | Article |
Language: | English |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Sensor networks are often deployed in unattended environments, thus leaving these networks vulnerable to
false data injection attacks
in which an adversary injects false data into the network with the goal of deceiving the base station or depleting the resources of the relaying nodes. Standard authentication mechanisms cannot prevent this attack if the adversary has compromised one or a small number of sensor nodes. We present three interleaved hop-by-hop authentication schemes that guarantee that the base station can detect injected false data
immediately
when no more than
t
nodes are compromised, where
t
is a system design parameter. Moreover, these schemes enable an intermediate forwarding node to detect and discard false data packets as early as possible. Our performance analysis shows that our scheme is efficient with respect to the security it provides, and it also allows a tradeoff between security and performance. A prototype implementation of our scheme indicates that our scheme is practical and can be deployed on the current generation of sensor nodes. |
---|---|
ISSN: | 1550-4859 1550-4867 |
DOI: | 10.1145/1267060.1267062 |