Loading…

Interleaved hop-by-hop authentication against false data injection attacks in sensor networks

Sensor networks are often deployed in unattended environments, thus leaving these networks vulnerable to false data injection attacks in which an adversary injects false data into the network with the goal of deceiving the base station or depleting the resources of the relaying nodes. Standard authe...

Full description

Saved in:
Bibliographic Details
Published in:ACM transactions on sensor networks 2007-08, Vol.3 (3), p.14
Main Authors: Zhu, Sencun, Setia, Sanjeev, Jajodia, Sushil, Ning, Peng
Format: Article
Language:English
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c338t-4d5be1268ab1588793dde65c9182f50359578557dbdc5d45368c5fdfa323137a3
cites cdi_FETCH-LOGICAL-c338t-4d5be1268ab1588793dde65c9182f50359578557dbdc5d45368c5fdfa323137a3
container_end_page
container_issue 3
container_start_page 14
container_title ACM transactions on sensor networks
container_volume 3
creator Zhu, Sencun
Setia, Sanjeev
Jajodia, Sushil
Ning, Peng
description Sensor networks are often deployed in unattended environments, thus leaving these networks vulnerable to false data injection attacks in which an adversary injects false data into the network with the goal of deceiving the base station or depleting the resources of the relaying nodes. Standard authentication mechanisms cannot prevent this attack if the adversary has compromised one or a small number of sensor nodes. We present three interleaved hop-by-hop authentication schemes that guarantee that the base station can detect injected false data immediately when no more than t nodes are compromised, where t is a system design parameter. Moreover, these schemes enable an intermediate forwarding node to detect and discard false data packets as early as possible. Our performance analysis shows that our scheme is efficient with respect to the security it provides, and it also allows a tradeoff between security and performance. A prototype implementation of our scheme indicates that our scheme is practical and can be deployed on the current generation of sensor nodes.
doi_str_mv 10.1145/1267060.1267062
format article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_30972935</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>30972935</sourcerecordid><originalsourceid>FETCH-LOGICAL-c338t-4d5be1268ab1588793dde65c9182f50359578557dbdc5d45368c5fdfa323137a3</originalsourceid><addsrcrecordid>eNo9kL1PwzAQxS0EEqUws3piC7VzudgZUcVHpUosMKLIsR2aNrWL7YD63xPaiul3H--eTo-QW87uOS9wxvNSsHJsDszPyIQjsqyQpTj_r7G6JFcxrhkDKIBNyMfCJRt6q76toSu_y5p9NoKqIa2sS51WqfOOqk_VuZhoq_poqVFJ0c6trT4uU1J6E8cJjdZFH6iz6ceHTbwmF4eLmxOn5P3p8W3-ki1fnxfzh2WmAWTKCoONHf-WquEopajAGFuirrjMW2SAFQqJKExjNJoCoZQaW9MqyIGDUDAld0ffXfBfg42p3nZR275Xzvoh1sAqkVeAo3B2FOrgYwy2rXeh26qwrzmr_2KsTzGemMMvR4Zl0A</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>30972935</pqid></control><display><type>article</type><title>Interleaved hop-by-hop authentication against false data injection attacks in sensor networks</title><source>Association for Computing Machinery:Jisc Collections:ACM OPEN Journals 2023-2025 (reading list)</source><creator>Zhu, Sencun ; Setia, Sanjeev ; Jajodia, Sushil ; Ning, Peng</creator><creatorcontrib>Zhu, Sencun ; Setia, Sanjeev ; Jajodia, Sushil ; Ning, Peng</creatorcontrib><description>Sensor networks are often deployed in unattended environments, thus leaving these networks vulnerable to false data injection attacks in which an adversary injects false data into the network with the goal of deceiving the base station or depleting the resources of the relaying nodes. Standard authentication mechanisms cannot prevent this attack if the adversary has compromised one or a small number of sensor nodes. We present three interleaved hop-by-hop authentication schemes that guarantee that the base station can detect injected false data immediately when no more than t nodes are compromised, where t is a system design parameter. Moreover, these schemes enable an intermediate forwarding node to detect and discard false data packets as early as possible. Our performance analysis shows that our scheme is efficient with respect to the security it provides, and it also allows a tradeoff between security and performance. A prototype implementation of our scheme indicates that our scheme is practical and can be deployed on the current generation of sensor nodes.</description><identifier>ISSN: 1550-4859</identifier><identifier>EISSN: 1550-4867</identifier><identifier>DOI: 10.1145/1267060.1267062</identifier><language>eng</language><ispartof>ACM transactions on sensor networks, 2007-08, Vol.3 (3), p.14</ispartof><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c338t-4d5be1268ab1588793dde65c9182f50359578557dbdc5d45368c5fdfa323137a3</citedby><cites>FETCH-LOGICAL-c338t-4d5be1268ab1588793dde65c9182f50359578557dbdc5d45368c5fdfa323137a3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><creatorcontrib>Zhu, Sencun</creatorcontrib><creatorcontrib>Setia, Sanjeev</creatorcontrib><creatorcontrib>Jajodia, Sushil</creatorcontrib><creatorcontrib>Ning, Peng</creatorcontrib><title>Interleaved hop-by-hop authentication against false data injection attacks in sensor networks</title><title>ACM transactions on sensor networks</title><description>Sensor networks are often deployed in unattended environments, thus leaving these networks vulnerable to false data injection attacks in which an adversary injects false data into the network with the goal of deceiving the base station or depleting the resources of the relaying nodes. Standard authentication mechanisms cannot prevent this attack if the adversary has compromised one or a small number of sensor nodes. We present three interleaved hop-by-hop authentication schemes that guarantee that the base station can detect injected false data immediately when no more than t nodes are compromised, where t is a system design parameter. Moreover, these schemes enable an intermediate forwarding node to detect and discard false data packets as early as possible. Our performance analysis shows that our scheme is efficient with respect to the security it provides, and it also allows a tradeoff between security and performance. A prototype implementation of our scheme indicates that our scheme is practical and can be deployed on the current generation of sensor nodes.</description><issn>1550-4859</issn><issn>1550-4867</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2007</creationdate><recordtype>article</recordtype><recordid>eNo9kL1PwzAQxS0EEqUws3piC7VzudgZUcVHpUosMKLIsR2aNrWL7YD63xPaiul3H--eTo-QW87uOS9wxvNSsHJsDszPyIQjsqyQpTj_r7G6JFcxrhkDKIBNyMfCJRt6q76toSu_y5p9NoKqIa2sS51WqfOOqk_VuZhoq_poqVFJ0c6trT4uU1J6E8cJjdZFH6iz6ceHTbwmF4eLmxOn5P3p8W3-ki1fnxfzh2WmAWTKCoONHf-WquEopajAGFuirrjMW2SAFQqJKExjNJoCoZQaW9MqyIGDUDAld0ffXfBfg42p3nZR275Xzvoh1sAqkVeAo3B2FOrgYwy2rXeh26qwrzmr_2KsTzGemMMvR4Zl0A</recordid><startdate>200708</startdate><enddate>200708</enddate><creator>Zhu, Sencun</creator><creator>Setia, Sanjeev</creator><creator>Jajodia, Sushil</creator><creator>Ning, Peng</creator><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>200708</creationdate><title>Interleaved hop-by-hop authentication against false data injection attacks in sensor networks</title><author>Zhu, Sencun ; Setia, Sanjeev ; Jajodia, Sushil ; Ning, Peng</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c338t-4d5be1268ab1588793dde65c9182f50359578557dbdc5d45368c5fdfa323137a3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2007</creationdate><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Zhu, Sencun</creatorcontrib><creatorcontrib>Setia, Sanjeev</creatorcontrib><creatorcontrib>Jajodia, Sushil</creatorcontrib><creatorcontrib>Ning, Peng</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>ACM transactions on sensor networks</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Zhu, Sencun</au><au>Setia, Sanjeev</au><au>Jajodia, Sushil</au><au>Ning, Peng</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Interleaved hop-by-hop authentication against false data injection attacks in sensor networks</atitle><jtitle>ACM transactions on sensor networks</jtitle><date>2007-08</date><risdate>2007</risdate><volume>3</volume><issue>3</issue><spage>14</spage><pages>14-</pages><issn>1550-4859</issn><eissn>1550-4867</eissn><abstract>Sensor networks are often deployed in unattended environments, thus leaving these networks vulnerable to false data injection attacks in which an adversary injects false data into the network with the goal of deceiving the base station or depleting the resources of the relaying nodes. Standard authentication mechanisms cannot prevent this attack if the adversary has compromised one or a small number of sensor nodes. We present three interleaved hop-by-hop authentication schemes that guarantee that the base station can detect injected false data immediately when no more than t nodes are compromised, where t is a system design parameter. Moreover, these schemes enable an intermediate forwarding node to detect and discard false data packets as early as possible. Our performance analysis shows that our scheme is efficient with respect to the security it provides, and it also allows a tradeoff between security and performance. A prototype implementation of our scheme indicates that our scheme is practical and can be deployed on the current generation of sensor nodes.</abstract><doi>10.1145/1267060.1267062</doi></addata></record>
fulltext fulltext
identifier ISSN: 1550-4859
ispartof ACM transactions on sensor networks, 2007-08, Vol.3 (3), p.14
issn 1550-4859
1550-4867
language eng
recordid cdi_proquest_miscellaneous_30972935
source Association for Computing Machinery:Jisc Collections:ACM OPEN Journals 2023-2025 (reading list)
title Interleaved hop-by-hop authentication against false data injection attacks in sensor networks
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-29T12%3A21%3A34IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Interleaved%20hop-by-hop%20authentication%20against%20false%20data%20injection%20attacks%20in%20sensor%20networks&rft.jtitle=ACM%20transactions%20on%20sensor%20networks&rft.au=Zhu,%20Sencun&rft.date=2007-08&rft.volume=3&rft.issue=3&rft.spage=14&rft.pages=14-&rft.issn=1550-4859&rft.eissn=1550-4867&rft_id=info:doi/10.1145/1267060.1267062&rft_dat=%3Cproquest_cross%3E30972935%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c338t-4d5be1268ab1588793dde65c9182f50359578557dbdc5d45368c5fdfa323137a3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=30972935&rft_id=info:pmid/&rfr_iscdi=true