Cargando…
Method for Detecting Manipulated Compilation of Sensing Reports in Wireless Sensor Networks
In cluster-based wireless sensor networks (WSNs), a few sensor nodes, including cluster heads (CHs), can be physically compromised by a malicious adversary. By using compromised CHs, the adversary can intentionally attach false message authentication codes into legitimate sensing reports in order to...
Autor principal: | |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Hindawi Publishing Corporation
2015
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4433703/ https://www.ncbi.nlm.nih.gov/pubmed/26065022 http://dx.doi.org/10.1155/2015/493162 |
_version_ | 1782371660088737792 |
---|---|
author | Lee, Hae Young |
author_facet | Lee, Hae Young |
author_sort | Lee, Hae Young |
collection | PubMed |
description | In cluster-based wireless sensor networks (WSNs), a few sensor nodes, including cluster heads (CHs), can be physically compromised by a malicious adversary. By using compromised CHs, the adversary can intentionally attach false message authentication codes into legitimate sensing reports in order to interrupt reporting of the real events. The existing solutions are vulnerable to such a type of security attacks, called manipulated compilation attacks (MCAs), since they assume that CHs are uncompromised. Thus, the reports manipulated by compromised CHs will be discarded by forwarding nodes or rejected at base stations, so that real events on the fields cannot be properly reported to the users. In this paper, the author proposes a method for the detection of MCAs in cluster-based WSNs. In the proposed method, every sensing report is collaboratively generated and verified by cluster nodes based on very loose synchronization. Once a cluster node has detected an MCA for a real event, it can reforward a legitimate report immediately. Therefore, the event can be properly reported to the users. The performance of the proposed method is shown with analytical and experimental results at the end of the paper. |
format | Online Article Text |
id | pubmed-4433703 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2015 |
publisher | Hindawi Publishing Corporation |
record_format | MEDLINE/PubMed |
spelling | pubmed-44337032015-06-10 Method for Detecting Manipulated Compilation of Sensing Reports in Wireless Sensor Networks Lee, Hae Young ScientificWorldJournal Research Article In cluster-based wireless sensor networks (WSNs), a few sensor nodes, including cluster heads (CHs), can be physically compromised by a malicious adversary. By using compromised CHs, the adversary can intentionally attach false message authentication codes into legitimate sensing reports in order to interrupt reporting of the real events. The existing solutions are vulnerable to such a type of security attacks, called manipulated compilation attacks (MCAs), since they assume that CHs are uncompromised. Thus, the reports manipulated by compromised CHs will be discarded by forwarding nodes or rejected at base stations, so that real events on the fields cannot be properly reported to the users. In this paper, the author proposes a method for the detection of MCAs in cluster-based WSNs. In the proposed method, every sensing report is collaboratively generated and verified by cluster nodes based on very loose synchronization. Once a cluster node has detected an MCA for a real event, it can reforward a legitimate report immediately. Therefore, the event can be properly reported to the users. The performance of the proposed method is shown with analytical and experimental results at the end of the paper. Hindawi Publishing Corporation 2015 2015-05-03 /pmc/articles/PMC4433703/ /pubmed/26065022 http://dx.doi.org/10.1155/2015/493162 Text en Copyright © 2015 Hae Young Lee. https://creativecommons.org/licenses/by/3.0/ This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. |
spellingShingle | Research Article Lee, Hae Young Method for Detecting Manipulated Compilation of Sensing Reports in Wireless Sensor Networks |
title | Method for Detecting Manipulated Compilation of Sensing Reports in Wireless Sensor Networks |
title_full | Method for Detecting Manipulated Compilation of Sensing Reports in Wireless Sensor Networks |
title_fullStr | Method for Detecting Manipulated Compilation of Sensing Reports in Wireless Sensor Networks |
title_full_unstemmed | Method for Detecting Manipulated Compilation of Sensing Reports in Wireless Sensor Networks |
title_short | Method for Detecting Manipulated Compilation of Sensing Reports in Wireless Sensor Networks |
title_sort | method for detecting manipulated compilation of sensing reports in wireless sensor networks |
topic | Research Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4433703/ https://www.ncbi.nlm.nih.gov/pubmed/26065022 http://dx.doi.org/10.1155/2015/493162 |
work_keys_str_mv | AT leehaeyoung methodfordetectingmanipulatedcompilationofsensingreportsinwirelesssensornetworks |