2. Wireless Sensor Networks
Composed of a large number of sensor nodes which are interconnected
through wireless links
Sensor node is low-cost
Sensor nodes are equipped with necessary sensing, data processing, and
communicating components
Sink (Data collection and processing unit)
Routers
3. Attacks to wireless sensor network
Wireless sensor networks are usually deployed at unattended or hostile
environments. Therefore, they are very vulnerable to various security attacks,
such as
selective forwarding
wormholes
Sybil attacks
injecting false data attack
4. False data attack
For an injecting false data attack, an adversary first compromises several
sensor nodes, accesses all keying materials stored in the compromised nodes,
and then controls these compromised nodes to inject bogus information and
send the false data to the sink to cause upper level error decision as well as
energy wasted in en-route nodes
An adversary could fabricate a wildfire event or report a wrong wildfire
location information to the sink, then expensive resources will be wasted by
sending rescue workers to a non-existing or wrong wildfire location
All false data are flooding into the sink simultaneously, huge energy will be
wasted in the en-route nodes, & also heavy verification burdens will
undoubtedly fall on the sink
8. BECAN Scheme Cont…
TinyECC-Based Non-Interactive Key Pair Establishment
Yi =xiG
Where yi = Public key
xi = Private key
G = Generation polynominal
Non-interactive key pair establishment
A secure Elliptic Curve Diffie-Hellman (ECDH) key pair
kij =xiYj =xixjG=xjxiG=xjYi =kji
9. Advantages of BECAN Scheme
High filtering probability and energy saving.
Detect injecting false data attack.
BECAN Scheme in terms of en-routing filtering probability and false negative
rate on true reports.
Early detecting the injected false data by the en-route sensor nodes.
Sink Verification prevent/Mitigate the gang injecting false data attack from
mobile compromised sensor nodes
11. References
Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor
Networks,“ IEEE Transactions on Parallel and Distributed Systems, vol.23, pp. 32-43, Jan 2012.
[2] S. He, J. Chen, Y. Sun, D. K. Y. Yau, and N. K. Yip, “On optimal information capture by energy-constrained
mobile sensors,” IEEE Transactions on Vehicular Technology, vol. 59, no. 5, pp. 2472–2484, June 2010.
[3] X. Li, A. Nayak, D. Simplot-Ryl, and I. Stojmenovic, “Sensor placement in sensor and actuator networks,”
Wireless Sensor and Actuator Networks: Algorithms and Protocols for Scalable Coordination and Data
Communication, Wiley, 2010.
[4] X. Lin, “CAT: Building couples to early detect node compromise attack in wireless sensor networks,” in Proc.
IEEE GLOBECOM’09, Honolulu, Hawaii, USA, Nov. 30 - Dec. 4 2009.
[5] X. Li, N. Santoro, and I. Stojmenovic, “Localized distance - sensitive service discovery in wireless sensor and
actor networks,” IEEE Transactions on Computers, vol. 58, no. 9, pp. 1275–1288, 2009.
[6] R. Lu, X. Lin, C. Zhang, H. Zhu, P. Ho, and X. Shen, “AICN: an efficient algorithm to identify compromised
nodes in wireless sensor network,” in Proc. IEEE ICC’08, Beijing, China, May 19-23 2008.
[7] V. C. Giruka, M. Singhal, J. Royalty, and S. Varanasi, “Security in wireless sensor networks,” Wireless
Communications and Mobile Computing, vol. 8, no. 1, pp. 1–24, January 2008.
[8] A. Liu and P. Ning, “TinyECC: a configurable library for elliptic curve cryptography in wireless sensor
networks,” in IPSN 2008, April 2008, pp. 245–256, sPOTS Track.
[9] X. Lin, R. Lu, P. Ho, X. Shen, and Z. Cao, “TUA: A novel compromise-resilient authentication architecture for
wireless mesh networks,” IEEE Transactions on Wireless Communications, vol. 7, no. 4, pp. 1389–1399, 2008.
[10] C. Zhang, R. Lu, X. Lin, P. Ho, and X. Shen, “An efficient identity-based batch verification scheme for
vehicular sensor networks,” in IEEE INFOCOM’08, Phoenix, AZ, USA, April 14-18 2008.