Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

becan

75 views

Published on

  • Be the first to comment

  • Be the first to like this

becan

  1. 1. A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks
  2. 2. Wireless Sensor Networks  Composed of a large number of sensor nodes which are interconnected through wireless links  Sensor node is low-cost  Sensor nodes are equipped with necessary sensing, data processing, and communicating components  Sink (Data collection and processing unit)  Routers
  3. 3. Attacks to wireless sensor network Wireless sensor networks are usually deployed at unattended or hostile environments. Therefore, they are very vulnerable to various security attacks, such as  selective forwarding  wormholes  Sybil attacks  injecting false data attack
  4. 4. False data attack  For an injecting false data attack, an adversary first compromises several sensor nodes, accesses all keying materials stored in the compromised nodes, and then controls these compromised nodes to inject bogus information and send the false data to the sink to cause upper level error decision as well as energy wasted in en-route nodes  An adversary could fabricate a wildfire event or report a wrong wildfire location information to the sink, then expensive resources will be wasted by sending rescue workers to a non-existing or wrong wildfire location  All false data are flooding into the sink simultaneously, huge energy will be wasted in the en-route nodes, & also heavy verification burdens will undoubtedly fall on the sink
  5. 5. Network model
  6. 6. Network Model Cont… 
  7. 7. BECAN Scheme  Uses cooperative neighbor × router (CNR) based filtering mechanism
  8. 8. BECAN Scheme Cont…  TinyECC-Based Non-Interactive Key Pair Establishment Yi =xiG Where yi = Public key xi = Private key G = Generation polynominal  Non-interactive key pair establishment A secure Elliptic Curve Diffie-Hellman (ECDH) key pair kij =xiYj =xixjG=xjxiG=xjYi =kji
  9. 9. Advantages of BECAN Scheme  High filtering probability and energy saving.  Detect injecting false data attack.  BECAN Scheme in terms of en-routing filtering probability and false negative rate on true reports.  Early detecting the injected false data by the en-route sensor nodes.  Sink Verification prevent/Mitigate the gang injecting false data attack from mobile compromised sensor nodes
  10. 10. Working Model Based on BECAN Scheme Using C#.Net Coding
  11. 11. References  Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks,“ IEEE Transactions on Parallel and Distributed Systems, vol.23, pp. 32-43, Jan 2012.  [2] S. He, J. Chen, Y. Sun, D. K. Y. Yau, and N. K. Yip, “On optimal information capture by energy-constrained mobile sensors,” IEEE Transactions on Vehicular Technology, vol. 59, no. 5, pp. 2472–2484, June 2010.  [3] X. Li, A. Nayak, D. Simplot-Ryl, and I. Stojmenovic, “Sensor placement in sensor and actuator networks,” Wireless Sensor and Actuator Networks: Algorithms and Protocols for Scalable Coordination and Data Communication, Wiley, 2010.  [4] X. Lin, “CAT: Building couples to early detect node compromise attack in wireless sensor networks,” in Proc. IEEE GLOBECOM’09, Honolulu, Hawaii, USA, Nov. 30 - Dec. 4 2009.  [5] X. Li, N. Santoro, and I. Stojmenovic, “Localized distance - sensitive service discovery in wireless sensor and actor networks,” IEEE Transactions on Computers, vol. 58, no. 9, pp. 1275–1288, 2009.  [6] R. Lu, X. Lin, C. Zhang, H. Zhu, P. Ho, and X. Shen, “AICN: an efficient algorithm to identify compromised nodes in wireless sensor network,” in Proc. IEEE ICC’08, Beijing, China, May 19-23 2008.  [7] V. C. Giruka, M. Singhal, J. Royalty, and S. Varanasi, “Security in wireless sensor networks,” Wireless Communications and Mobile Computing, vol. 8, no. 1, pp. 1–24, January 2008.  [8] A. Liu and P. Ning, “TinyECC: a configurable library for elliptic curve cryptography in wireless sensor networks,” in IPSN 2008, April 2008, pp. 245–256, sPOTS Track.  [9] X. Lin, R. Lu, P. Ho, X. Shen, and Z. Cao, “TUA: A novel compromise-resilient authentication architecture for wireless mesh networks,” IEEE Transactions on Wireless Communications, vol. 7, no. 4, pp. 1389–1399, 2008.  [10] C. Zhang, R. Lu, X. Lin, P. Ho, and X. Shen, “An efficient identity-based batch verification scheme for vehicular sensor networks,” in IEEE INFOCOM’08, Phoenix, AZ, USA, April 14-18 2008.

×