Journal of Applied Science and Engineering

Published by Tamkang University Press

1.30

Impact Factor

2.10

CiteScore

Shuguang Zhang This email address is being protected from spambots. You need JavaScript enabled to view it.1,2, Xuehai Zhou2 , Feng Yang2 and Jun Xu2

1School of Electronics and Information Engineering, Anhui JianZhu University, Hefei, P.R. China
2School of Computer Science and Technology, University of Science and Technology of China, Hefei, P.R. China


 

Received: July 9, 2015
Accepted: September 7, 2015
Publication Date: December 1, 2015

Download Citation: ||https://doi.org/10.6180/jase.2015.18.4.11  


ABSTRACT


The false data injection attack has been regarded as a significant challenge in wireless sensor networks. Malicious nodes could launch false data injection attacks by sending a lot of forged packets, in order to exhaust network resources and influence the user decision. In order to efficiently locate the malicious nodes, this paper proposes an edge marking strategy based on two-hop neighbor information. Sensor nodes are divided into two types marking nodes and non-marking nodes in this method, and only marking nodes need to mark packets with certain probability. The Sink nodes will trace the malicious nodes by using the received traceback information of packet marking. Theoretical analysis and experimental results demonstrate that the strategy only needs the marking nodes to reconstruct the attack path. Furthermore, due to the reason that the path between adjacent marking nodes can be obtained by two-hop neighbor information, the reconstruction attack path length is reduced to 50% of traditional methods, and the number of packets needed is greatly reduced.


Keywords: Wireless Sensor Network, Two-Hop Neighbor Information, Traceback, Probabilistic Edge Marking


REFERENCES


  1. [1] Wood, A. D. and Stankovic, J. A., “Denial of Service in Sensor Networks,” IEEE Computer, Vol. 35, No. 10, pp. 5462 (2002). doi: 10.1109/MC.2002.1039518
  2. [2] Ye, F., Luo, H., Lu, S., et al., “Statistical En-route Filtering of Injected False Data in Sensor Networks,” Proceedings of 23th Annual Joint Conference of the IEEE Computer and Communication Societies, pp. 2446 2457 (2004). doi: 10.1109/INFCOM.2004.1354666
  3. [3] Yang, H., Ye, F., Yuan, Y., et al., “Toward Resilient Security in Wireless Sensor Networks,” Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 3445 (2005). doi: 10.1145/1062689.1062696
  4. [4] Yu, L. and Li, J., “Grouping-based Resilient Statistical En-route Filtering for Sensor Networks,” Proceedings of 28th Annual Joint Conference of the IEEE Computer and Communications Societies, pp. 17821790 (2009). doi: 10.1109/INFCOM.2009.5062098
  5. [5] Liu, Z. and Wang, J., “Geographical Information Based False Report Filtering Scheme in Wireless Sensor Networks [J],” Journal on Communications, Vol. 33, No. 2, pp. 156163 (2012). doi: 10.4304/jcp.8.2.388-398
  6. [6] Sy, D. and Bao, L., “CAPTRA: Coordinated Packet Traceback [C],” Proceedings of 5th International Conference on Information Processing in Sensor Networks, pp. 152159 (2006). doi: 10.1109/IPSN.2006.244130
  7. [7] Zhang, Q., Zhou, X., Yang, F., et al., “Contact-based Traceback in Wireless Sensor Networks,” The 3rd IEEE International Conference on Wireless Communications, Networking and Mobile Computing, pp. 24872490 (2007). doi: 10.1109/WICOM.2007.619
  8. [8] Ye, F., Yang, H. and Liu, Z., “Catching “Moles” in Sensor Networks,” Proceedings of 27th IEEE International Conference on Distributed Computing Systems, pp. 6977 (2007). doi: 10.1109/ICDCS.2007.89
  9. [9] Yang, F., Zhou, X., Zhang, Q., et al., “A Practical Traceback Mechanism in Wireless Sensor Networks,” Acta Electronica Sinica, Vol. 37, No. 1, pp. 202 206 (2009).
  10. [10] Xu, J., Zhou, X. and Yang, F., “Edge-based Traceback in Sensor Networks,” The 6th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM), pp. 14 (2010).
  11. [11] Xu, J., Zhou, X. and Yang, F., “Traceback in Wireless Sensor Networks with Packet Marking and Logging,” Frontiers of Computer Science in China, Vol. 5, No. 3, pp. 308315 (2011). doi: 10.1007/s11704-011-0361-y
  12. [12] Zhang, S., Zhou, X., Yang, F., et al., “Traceback Mechanism Based on Neighbor Information in Wireless Sensor Networks,” Journal of Chinese Computer Systems, Vol. 36, No. 3, pp. 483487 (2015).
  13. [13] Zhu, S., Setia, S. and Jajodia, S., “LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks,” The 10th ACM Conference on Computer and Communications Security, pp. 6272 (2003).
  14. [14] Marti, S., Giuli, T., Lai, K., et al., “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks,” Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, pp. 255265 (2000).