False Data Detection Using MAC pairs in Wireless Sensor Networks

  IJCOT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© - April Issue 2013 by IJCTT Journal
Volume-4 Issue-4                           
Year of Publication : 2013
Authors :V.M.Sivagami, K.S.Easwara Kumar

MLA

V.M.Sivagami, K.S.Easwara Kumar "False Data Detection Using MAC pairs in Wireless Sensor Networks"International Journal of Computer Trends and Technology (IJCTT),V4(4):539-545 April Issue 2013 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract: -Wireless sensor networks are vulnerable to many types of security attacks, including false data injection, data forgery, and eavesdropping. Sensor nodes can be compromised by intruders, and the compromised nodes can distort data integrity by injecting false data. False data can be injected by compromised sensor nodes in various ways, including data aggregation and relaying. Data confidentiality prefers data to be encrypted at the source node and decrypted at the destination. However, data aggregation techniques usually require any encrypted sensor data to be decrypted at data aggregators for aggregation. The basic idea behind the false data detection algorithm is to form pairs of sensor nodes such that one pair computes a message authentication code (MAC) of forwarded data and the other pair mate later verifies the data using the MAC. Data aggregation is implemented in wireless sensor networks to eliminate data redundancy, reduce data transmission, and improve data accuracy.

 

References-
[1] Suat Ozdemir, Member, IEEE, and Hasan Çam, Senior Member, IEEE, ” Integration of False Data Detection With Data Aggregation and Confidential Transmission in Wireless Sensor Networks”,Vol.18,no.3,June 2010.
[2] Z. Yu and Y. Guan, “A dynamic en-route scheme for filtering false data in wireless sensor networks,” in Proc. IEEE INFOCOM, Barcelona, Spain, Apr. 23–27, 2006, pp. 1–12.
[3] R. Rajagopalan and P. K. Varshney, “Data aggregation techniques in sensor networks: A survey,” IEEE Commun. Surveys Tutorials, vol. 8, no. 4, 4th Quarter 2006.
[4] W. Du, J. Deng, Y. S. Han, and P. K. Varshney, “A witness-based approach for data fusion assurance in wireless sensor networks,” in Proc. IEEE GLOBECOM, 2003, pp. 1435–1439.
[5] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “A survey on sensor networks,” IEEE Commun. Mag., vol. 40, no. 8, pp. 102–114, Aug. 2002.
[6] M. Sivrianosh, D.Westhoff, F. Armknecht, and J. Girao, “Non-manipulable aggregator node election protocols for wireless sensor networks,” in Proc. IEEE WiOpt, Cyprus, Apr. 2007, pp. 1–10.

Keywords — Data aggregation and authentication protocol (DAA), Data integrity, network-level security, Message Authentication Code(MAC) and Sensor networks.