Cargando…

Method for Detecting Manipulated Compilation of Sensing Reports in Wireless Sensor Networks

In cluster-based wireless sensor networks (WSNs), a few sensor nodes, including cluster heads (CHs), can be physically compromised by a malicious adversary. By using compromised CHs, the adversary can intentionally attach false message authentication codes into legitimate sensing reports in order to...

Descripción completa

Detalles Bibliográficos
Autor principal: Lee, Hae Young
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Hindawi Publishing Corporation 2015
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4433703/
https://www.ncbi.nlm.nih.gov/pubmed/26065022
http://dx.doi.org/10.1155/2015/493162
_version_ 1782371660088737792
author Lee, Hae Young
author_facet Lee, Hae Young
author_sort Lee, Hae Young
collection PubMed
description In cluster-based wireless sensor networks (WSNs), a few sensor nodes, including cluster heads (CHs), can be physically compromised by a malicious adversary. By using compromised CHs, the adversary can intentionally attach false message authentication codes into legitimate sensing reports in order to interrupt reporting of the real events. The existing solutions are vulnerable to such a type of security attacks, called manipulated compilation attacks (MCAs), since they assume that CHs are uncompromised. Thus, the reports manipulated by compromised CHs will be discarded by forwarding nodes or rejected at base stations, so that real events on the fields cannot be properly reported to the users. In this paper, the author proposes a method for the detection of MCAs in cluster-based WSNs. In the proposed method, every sensing report is collaboratively generated and verified by cluster nodes based on very loose synchronization. Once a cluster node has detected an MCA for a real event, it can reforward a legitimate report immediately. Therefore, the event can be properly reported to the users. The performance of the proposed method is shown with analytical and experimental results at the end of the paper.
format Online
Article
Text
id pubmed-4433703
institution National Center for Biotechnology Information
language English
publishDate 2015
publisher Hindawi Publishing Corporation
record_format MEDLINE/PubMed
spelling pubmed-44337032015-06-10 Method for Detecting Manipulated Compilation of Sensing Reports in Wireless Sensor Networks Lee, Hae Young ScientificWorldJournal Research Article In cluster-based wireless sensor networks (WSNs), a few sensor nodes, including cluster heads (CHs), can be physically compromised by a malicious adversary. By using compromised CHs, the adversary can intentionally attach false message authentication codes into legitimate sensing reports in order to interrupt reporting of the real events. The existing solutions are vulnerable to such a type of security attacks, called manipulated compilation attacks (MCAs), since they assume that CHs are uncompromised. Thus, the reports manipulated by compromised CHs will be discarded by forwarding nodes or rejected at base stations, so that real events on the fields cannot be properly reported to the users. In this paper, the author proposes a method for the detection of MCAs in cluster-based WSNs. In the proposed method, every sensing report is collaboratively generated and verified by cluster nodes based on very loose synchronization. Once a cluster node has detected an MCA for a real event, it can reforward a legitimate report immediately. Therefore, the event can be properly reported to the users. The performance of the proposed method is shown with analytical and experimental results at the end of the paper. Hindawi Publishing Corporation 2015 2015-05-03 /pmc/articles/PMC4433703/ /pubmed/26065022 http://dx.doi.org/10.1155/2015/493162 Text en Copyright © 2015 Hae Young Lee. https://creativecommons.org/licenses/by/3.0/ This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
spellingShingle Research Article
Lee, Hae Young
Method for Detecting Manipulated Compilation of Sensing Reports in Wireless Sensor Networks
title Method for Detecting Manipulated Compilation of Sensing Reports in Wireless Sensor Networks
title_full Method for Detecting Manipulated Compilation of Sensing Reports in Wireless Sensor Networks
title_fullStr Method for Detecting Manipulated Compilation of Sensing Reports in Wireless Sensor Networks
title_full_unstemmed Method for Detecting Manipulated Compilation of Sensing Reports in Wireless Sensor Networks
title_short Method for Detecting Manipulated Compilation of Sensing Reports in Wireless Sensor Networks
title_sort method for detecting manipulated compilation of sensing reports in wireless sensor networks
topic Research Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4433703/
https://www.ncbi.nlm.nih.gov/pubmed/26065022
http://dx.doi.org/10.1155/2015/493162
work_keys_str_mv AT leehaeyoung methodfordetectingmanipulatedcompilationofsensingreportsinwirelesssensornetworks