Resilience Against False Data Injection Attack in Wireless Sensor Networks

Resilience Against False Data Injection Attack in Wireless Sensor Networks

Miao Ma
Copyright: © 2008 |Pages: 8
DOI: 10.4018/978-1-59904-899-4.ch038
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

One of the severe security threats in wireless sensor network is false data injection attack, that is, the compromised sensors forge the events that do not occur. To defend against false data injection attack, six en-route filtering schemes in a homogeneous sensor network are described. Furthermore, one sink filtering scheme in a heterogeneous sensor network is also presented. We find that deploying heterogeneous nodes in a sensor network is an attractive approach because of its potential to increase network lifetime, reliability, and resiliency.

Key Terms in this Chapter

False Data Injection Attack: The type of attack when the compromised sensors forge the events that do not occur.

Compromised Nodes: Nodes on which an attacker has gained control after network deployment.

Key Management: The process of managing key materials (e.g., key generation, key distribution, etc.) in a cryptosystem.

Threshold Breakdown Problem: We say a security design has threshold breakdown problem if the design is secure against t or less compromised nodes, but once more than t nodes are compromised the security design completely breaks down, where t is a fixed threshold.

Aggregation Report: A data structure that synthesizes the state of the phenomena that the wireless sensor network is monitoring.

Message Authentication Code (MAC): It is a short piece of information used to authenticate a message.

Wireless Sensor Network (WSN): The wireless networks consisting of small sensors that cooperatively monitor environmental conditions, such as temperature, humidity, and so forth.

Complete Chapter List

Search this Book:
Reset