Excluding compromised node by tracing false data injected messages in Wireless Sensor Network

S. Geedhabhanu, P. Latha
{"title":"Excluding compromised node by tracing false data injected messages in Wireless Sensor Network","authors":"S. Geedhabhanu, P. Latha","doi":"10.1109/ICIICT.2015.7396096","DOIUrl":null,"url":null,"abstract":"Wireless Sensor Network (WSN) is a collection of sensor nodes that involve in gathering of happenings from a nodes' surrounding. They help in supervising all the mission critical applications instead of depending on humans in monitoring cynical areas. Sensor nodes play a important role in alerting us any distinct changes that occur in the sited area and is prone to innumerous attacks. These attacks damage trust with the received data from a sensor node. One such type of attack is the false data injection attack. The message is forged by the adversary, not detected by the forwarding nodes as false information. Compromised node is the origin of false data to be injected in to the WSN. The proposed work discards the false data injected message from the network. This issue of compromised node is handled by the detection and elimination of it from causing further damage to the network by incorporating Elliptical Curve Cryptography (ECC) technique for data authentication to any message received. A node involved in sensing requires a high range of sensing power. But sensor nodes have limited energy and this is a battle for all technicians in creating any inventions that suits this constraint. The proposed scheme provides safety and reliability over the received data and offers less power consumption and memory utilization of the sensor node.","PeriodicalId":135283,"journal":{"name":"International Confernce on Innovation Information in Computing Technologies","volume":"18 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Confernce on Innovation Information in Computing Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICIICT.2015.7396096","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Wireless Sensor Network (WSN) is a collection of sensor nodes that involve in gathering of happenings from a nodes' surrounding. They help in supervising all the mission critical applications instead of depending on humans in monitoring cynical areas. Sensor nodes play a important role in alerting us any distinct changes that occur in the sited area and is prone to innumerous attacks. These attacks damage trust with the received data from a sensor node. One such type of attack is the false data injection attack. The message is forged by the adversary, not detected by the forwarding nodes as false information. Compromised node is the origin of false data to be injected in to the WSN. The proposed work discards the false data injected message from the network. This issue of compromised node is handled by the detection and elimination of it from causing further damage to the network by incorporating Elliptical Curve Cryptography (ECC) technique for data authentication to any message received. A node involved in sensing requires a high range of sensing power. But sensor nodes have limited energy and this is a battle for all technicians in creating any inventions that suits this constraint. The proposed scheme provides safety and reliability over the received data and offers less power consumption and memory utilization of the sensor node.
在无线传感器网络中,通过跟踪假数据注入消息来排除受损节点
无线传感器网络(WSN)是一个传感器节点的集合,涉及从节点周围收集事件。他们帮助监督所有关键任务的应用程序,而不是依赖于人类在监控愤世嫉俗的领域。传感器节点在提醒我们发生在站点区域的任何明显变化方面发挥着重要作用,并且容易受到无数攻击。这些攻击破坏了对从传感器节点接收数据的信任。其中一种类型的攻击是虚假数据注入攻击。该消息是由攻击者伪造的,转发节点不会将其检测为虚假信息。受损节点是要注入WSN的虚假数据的来源。该工作丢弃了来自网络的假数据注入消息。通过对接收到的任何消息进行数据验证的椭圆曲线加密(ECC)技术,可以检测并消除对网络造成进一步损害的节点受损问题。参与传感的节点需要高范围的传感功率。但传感器节点的能量有限,这是所有技术人员在创造任何适合这种限制的发明方面的一场战斗。该方案不仅保证了接收数据的安全性和可靠性,而且降低了传感器节点的功耗和内存利用率。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信