Netinfo Security ›› 2023, Vol. 23 ›› Issue (5): 22-31.doi: 10.3969/j.issn.1671-1122.2023.05.003
Previous Articles Next Articles
FENG Guangsheng, ZHANG Yingxi(), REN Yifei, GAO Sulin
Received:
2023-01-17
Online:
2023-05-10
Published:
2023-05-15
Contact:
ZHANG Yingxi
E-mail:zyx19981028@163.com
CLC Number:
FENG Guangsheng, ZHANG Yingxi, REN Yifei, GAO Sulin. Research on En-Route False Data Filtering Technology in Wireless Sensor Network[J]. Netinfo Security, 2023, 23(5): 22-31.
Add to citation manager EndNote|Ris|BibTeX
URL: http://netinfo-security.org/EN/10.3969/j.issn.1671-1122.2023.05.003
[1] | REN Fengyuan, HUANG Haining, LIN Chuang. Wireless Sensor Networks[J]. Journal of Software, 2003, 14(7): 1282-1291. |
任丰原, 黄海宁, 林闯. 无线传感器网络[J]. 软件学报, 2003, 14(7):1282-1291. | |
[2] | TAFA Z. WSNs in Environmental Monitoring: Data Acquisition and Dissemination Aspects[J]. Advances in Computers, 2022, 126: 65-149. |
[3] |
KHAN T H F, KUMAR D S. Ambient Crop Field Monitoring for Improving Context Based Agricultural by Mobile Sink in WSN[J]. Journal of Ambient Intelligence and Humanized Computing, 2020, 11: 1431-1439.
doi: 10.1007/s12652-019-01177-6 |
[4] |
IMRAN L B, LATIF R M A, FARHAN M, et al. Smart City Based Autonomous Water Quality Monitoring System Using WSN[J]. Wireless Personal Communications, 2020, 115: 1805-1820.
doi: 10.1007/s11277-020-07655-x |
[5] |
BASHIR N, BOUDJIT S, ZEADALLY S. A Closed-Loop Control Architecture of UAV and WSN for Traffic Surveillance on Highways[J]. Computer Communications, 2022, 190: 78-86.
doi: 10.1016/j.comcom.2022.04.008 URL |
[6] | JAIN U, HUSSAIN M. Security Mechanism for Maritime Territory and Frontier Surveillance in Naval Operations Using Wireless Sensor Networks[J]. Concurrency and Computation: Practice and Experience, 2021, 33(17): 1-15. |
[7] | CHEN Dong. Research on Key Technologies for Privacy Protection of Source Nodes in Wireless Sensor Networks[D]. Beijing: Beijing Jiaotong University, 2021. |
陈栋. 无线传感器网络源节点位置隐私保护关键技术研究[D]. 北京: 北京交通大学, 2021. | |
[8] |
KUMAR A, PAIS A R. En-Route Filtering Techniques in Wireless Sensor Networks: A Survey[J]. Wireless Personal Communications, 2017, 96(1): 697-739.
doi: 10.1007/s11277-017-4197-0 URL |
[9] | MEHTA M, PATEL K. Experimental Study of Location Spoofing and Identity Spoofing Attack in Internet of Things Network[J]. International Journal of Intelligent Information Technologies, 2022, 18(3): 1-13. |
[10] | ZHAI Lijing, VAMVOUDAKIS K G, HUGUES J. Switching Watermarking-Based Detection Scheme Against Replay Attacks[C]// IEEE. 60th IEEE Conference on Decision and Control(CDC). New York: IEEE, 2021: 4200-4205. |
[11] | YLLI E, FEJZAJ J. Man in the Middle: Attack and Protection[C]// CEUR-WS. 4th International Conference on Recent Trends and Applications in Computer Science and Information Technology(RTA-CSIT). Tirana: CEUR-WS, 2021: 198-204. |
[12] |
YE Fan, LUO Haiyun, LU Songwu, et al. Statistical En-Route Filtering of Injected False Data in Sensor Networks[J]. IEEE Journal on Selected Areas in Communications, 2005, 23(4): 839-850.
doi: 10.1109/JSAC.2005.843561 URL |
[13] | DU Tianqi. Research on Wireless Sensor Network Security and Key Management Technology[J]. Wireless Internet Technology, 2021, 18(12): 13-14. |
杜天琦. 无线传感器网络安全与密钥管理技术研究[J]. 无线互联科技, 2021, 18(12):13-14. | |
[14] | SUN Qian, WU Min. A Double Key-Sharing Based False Data Filtering Scheme in Wireless Sensor Networks[C]// IEEE. 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications. New York: IEEE, 2011: 509-516. |
[15] | ZHANG Wensheng, CAO Guohong. Group Rekeying for Filtering False Data in Sensor Networks: A Predistribution and Local Collaboration-Based Approach[C]// IEEE. 24th Annual Joint Conference of the IEEE Computer and Communications Societies. New York: IEEE, 2005: 503-514. |
[16] | LIU Zhixiong, WANG Jianxin, ZHANG Xi. A False Data Filtering Scheme Using Cluster-Based Organization in Sensor Networks[C]// IEEE. International Conference on Communications(ICC). New York: IEEE, 2011: 1-5. |
[17] |
KUMAR A, PAIS A R. Deterministic En-Route Filtering of False Reports: A Combinatorial Design Based Approach[J]. IEEE Access, 2018, 6: 74494-74505.
doi: 10.1109/ACCESS.2018.2883474 URL |
[18] |
CHOI H M, NAM S M, CHO T H. A Secure Routing Method for Detecting False Reports and Wormhole Attacks in Wireless Sensor Networks[J]. Wireless Sensor Network, 2013, 5(3): 33-40.
doi: 10.4236/wsn.2013.53005 URL |
[19] | YANG Hao, YE Fan, YUAN Yuan, et al. Toward Resilient Security in Wireless Sensor Networks[C]// ACM. 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing. New York: ACM, 2005: 34-45. |
[20] | YU Lei, LI Jianzhong. Grouping-Based Resilient Statistical En-Route Filtering for Sensor Networks[C]// IEEE. INFOCOM. New York: IEEE, 2009: 1782-1790. |
[21] |
REN Kui, LOU Wenjing, ZHANG Yanchao. LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks[J]. IEEE Transactions on Mobile Computing, 2008, 7(5): 585-598.
doi: 10.1109/TMC.2007.70753 URL |
[22] | FAKHREY H, BOUSSAKTA S, TIWARI R, et al. Location-Dependent Key Management Protocol for a WSN with a Random Selected Cell Reporter[C]// IEEE. International Conference on Communications(ICC). New York: IEEE, 2015: 6300-6305. |
[23] |
WANG Jianxin, LIU Zhixiong, ZHANG Shigeng, et al. Defending Collaborative False Data Injection Attacks in Wireless Sensor Networks[J]. Information Sciences, 2014, 254: 39-53
doi: 10.1016/j.ins.2013.08.019 URL |
[24] |
KUMAR A, BANSAL N, PAIS A R. A Partial Key Pre-Distribution Based En-Route Filtering Scheme for Wireless Sensor Networks[J]. Journal of Ambient Intelligence and Humanized Computing, 2021, 12(1): 1471-1486.
doi: 10.1007/s12652-020-02216-3 |
[25] | HU Yupeng, LIN Yaping, LIU Yonghe, et al. RAS: A Robust Authentication Scheme for Filtering False Data in Wireless Sensor Networks[C]// IEEE. 15th IEEE International Conference on Networks. New York: IEEE, 2007: 200-205. |
[26] | ZHOU Li, RAVISHANKAR C V. A Fault Localized Scheme for False Report Filtering in Sensor Networks[C]// IEEE. International Conference on Pervasive Services. New York: IEEE, 2005: 59-68. |
[27] | LIU Zhixiong, WANG Jiangtao, WANG Weiping, et al. One-Way Hash Chain Based Filtering Scheme in Wireless Sensor Networks[J]. Journal of Software, 2014, 25(10): 2385-2396. |
刘志雄, 王江涛, 王伟平, 等. 传感器网络中一种基于单向哈希链的过滤方案[J]. 软件学报, 2014, 25(10):2385-2396. | |
[28] |
YU Zhen, GUAN Yong. A Dynamic En-Route Filtering Scheme for Data Reporting in Wireless Sensor Networks[J]. IEEE/ACM Transactions on Networking, 2009, 18(1): 150-163.
doi: 10.1109/TNET.2009.2026901 URL |
[29] | YUAN Ting, ZHANG Shiyong, ZHONG Yiping, et al. KAEF: An En-Route Scheme of Filtering False Data in Wireless Sensor Networks[C]// IEEE. IEEE International Performance, Computing and Communications Conference. New York: IEEE, 2008: 193-200. |
[30] | ZHU Sencun, SETIA S, JAJODIA S, et al. An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks[C]// IEEE. Symposium on Security and Privacy. New York: IEEE, 2004: 259-271. |
[31] | KRAUB C, SCHNEIDER M, BAYAROU K, et al. STEF: A Secure Ticket-Based En-Route Filtering Scheme for Wireless Sensor Networks[C]// IEEE. The Second International Conference on Availability, Reliability and Security. New York: IEEE, 2007: 310-317. |
[32] | KUMAR A, PAIS A R. Blockchain Based En-Route Filtering of False Data in Wireless Sensor Networks[C]// IEEE. 11th International Conference on Communication Systems & Networks. New York: IEEE, 2019: 1-6. |
[33] | YANG Hao, LU Songwu. Commutative Cipher Based En-Route Filtering in Wireless Sensor Networks[C]// IEEE. 60th Vehicular Technology Conference, 2004. VTC2004-Fall. New York: IEEE, 2004: 1223-1227. |
[34] |
WANG Haodong, LI Qun. Achieving Robust Message Authentication in Sensor Networks: A Public-Key Based Approach[J]. Wireless Networks, 2010, 16(4): 999-1009.
doi: 10.1007/s11276-009-0184-z URL |
[35] | YU Hong, HE Jingsha. Authentication and En-Route Data Filtering for Wireless Sensor Networks in the Internet of Things Scenario[J]. International Journal of Grid and Distributed Computing, 2013, 6(1): 1-12. |
[36] | HU Y C, PERRIG A, JOHNSON D B. Packet Leashes: A Defense Against Wormhole Attacks in Wireless Networks[C]// IEEE. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies. New York: IEEE, 2003: 1976-1986. |
[37] |
FAKHREY H, JOHNSTON M, ANGELINI F, et al. The Optimum Design of Location-Dependent Key Management Protocol for a Multiple Sink WSN Using a Random Selected Cell Reporter[J]. IEEE Sensors Journal, 2018, 18(24): 10163-10173.
doi: 10.1109/JSEN.2018.2871661 URL |
[38] | WANG Jing. Tracing and Filtering Analysis of False Data Based on Python Crawler Technology[J]. Henan Science and Technology, 2021, 40(22): 27-30. |
王景. 基于Python爬虫技术的虚假数据溯源与途中过滤分析[J]. 河南科技, 2021, 40(22):27-30. | |
[39] |
SONG Xiaoli, GONG Yunzhan, JIN Dahai, et al. Nodes Deployment Based on Directed Perception Model of Wireless Sensor Networks[J]. Journal of Beijing University of Posts and Telecommunications, 2017, 40(S1): 39-42.
doi: 10.13190/j.jbupt.2017.s.009 |
宋晓莉, 宫云战, 金大海, 等. 基于有向感知模型的无线传感器网络节点部署[J]. 北京邮电大学学报, 2017, 40(S1):39-42. | |
[40] |
LIU Zhixiong, LI Limiao. Modeling and Simulation of False Report Filtering Scheme Based on Position in Wireless Sensor Networks[J]. Journal of System Simulation, 2019, 31(1): 27-35.
doi: 10.16182/j.issn1004731x.joss.17-0043E |
刘志雄, 黎梨苗. 传感器网络中基于位置的虚假数据过滤的建模与仿真[J]. 系统仿真学报, 2019, 31(1):27-35.
doi: 10.16182/j.issn1004731x.joss.17-0043E |
|
[41] |
LIU Zhixiong, YE Hui, LI Fangmin. A Location and Optimal Coverage Based Filtering Scheme in Wireless Sensor Networks[J]. IEEE Access, 2020, 8: 41740-41748.
doi: 10.1109/Access.6287639 URL |
[42] |
LU Rongxing, LIN Xiaodong, ZHU Haojin, et al. BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks[J]. IEEE Transactions on Parallel and Distributed Systems, 2011, 23(1): 32-43.
doi: 10.1109/TPDS.2011.95 URL |
[43] | YI Chuanjun. En-Route Message Authentication Scheme for Filtering False Data in WSNs[EB/OL]. (2021-01-01)[2022-11-20]. https://doi.org/10.1155/2021/4068507. |
[44] | LI Ronghua, YU J X, HUANG Xin, et al. Robust Reputation-Based Ranking on Bipartite Rating Networks[C]// SIAM. 2012 SIAM International Conference on Data Mining. Philadelphia: SIAM, 2012: 612-623. |
[45] | FANG Baogang, ZHONG Bocheng, ZHANG Jialei. Data Security Aggregation Method in WSNs[J]. Transducer and Microsystem Technologies, 2022, 41(4): 146-148, 152. |
房保纲, 钟伯成, 张家磊. 无线传感器网络中数据安全聚合方法[J]. 传感器与微系统, 2022, 41(4):146-148,152. | |
[46] |
DE K C, VAN D P. Iterative Filtering in Reputation Systems[J]. SIAM Journal on Matrix Analysis and Applications, 2010, 31(4): 1812-1834.
doi: 10.1137/090748196 URL |
[47] |
YI Yeqing, LIN Yaping, LI Xiaolong, et al. False Data Filtering Algorithm Using Cooperation Watermarks for WSN[J]. Journal of Software, 2010, 21(1): 107-118.
doi: 10.3724/SP.J.1001.2010.03373 URL |
易叶青, 林亚平, 李小龙, 等. WSN中基于协作水印的虚假数据过滤算法[J]. 软件学报, 2010, 21(1):107-118. | |
[48] | NATH S, GIBBONS P B, SESHAN S, et al. Synopsis Diffusion for Robust Aggregation in Sensor Networks[J]. ACM Transactions on Sensor Networks(TOSN), 2008, 4(2): 1-40. |
[49] |
ROY S, CONTI M, SETIA S, et al. Secure Data Aggregation in Wireless Sensor Networks[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(3): 1040-1052.
doi: 10.1109/TIFS.2012.2189568 URL |
[50] |
MA Miao. Resilience of Sink Filtering Scheme in Wireless Sensor Networks[J]. Computer Communications, 2006, 30(1): 55-65.
doi: 10.1016/j.comcom.2006.07.015 URL |
[1] | ZHOU Jingyi, LI Hongjiao. False Data Injection Attack Detection Method against PMU Measurements [J]. Netinfo Security, 2022, 22(5): 75-83. |
[2] | ZHANG Yongtang. A Secure Area Based Clustering Approach for Traffic Analysis in WSN [J]. Netinfo Security, 2021, 21(9): 80-89. |
[3] | XIAO Shuai, ZHANG Hanlin, XIAN Hequn, CHEN Fei. A Password Authentication Key Agreement Protocol for IoT Devices [J]. Netinfo Security, 2021, 21(10): 83-89. |
[4] | JIANG Jinfang, HAN Guangjie. Survey of Trust Management Mechanism in Wireless Sensor Network [J]. Netinfo Security, 2020, 20(4): 12-20. |
[5] | Baoyuan KANG, Jiaqiang WANG, Dongyang SHAO, Chunqing LI. A Secure Authentication and Key Agreement Protocol for Heterogeneous Ad Hoc Wireless Sensor Networks [J]. Netinfo Security, 2018, 18(1): 23-30. |
[6] | Hongyan ZHANG, Li XU, Limei LIN. Research on Pairwise Key Establishment Scheme Based on Hypercube in Wireless Sensor Network [J]. Netinfo Security, 2017, 17(12): 1-5. |
[7] | Dunhao ZHONG, Dongmei ZHANG, Yu ZHANG. A Method of Intrusion Detection in Wireless Sensor Network Based on Similarity Algorithm [J]. Netinfo Security, 2016, 16(2): 22-27. |
[8] | Wei LIU, Qing YE, Cheng WANG. Improved LEACH Algorithm Based on Dynamic Key Management [J]. Netinfo Security, 2015, 15(8): 41-46. |
[9] | Bin-ting SU, He FANG, Li XU. Q-Learning-based Routing Protocol for the Balance of WSN Lifetime [J]. Netinfo Security, 2015, 15(4): 74-77. |
[10] | Wan-wan GONG, Shi-xing LIU, Ting-ting FENG. The Platform Design of Smart-house Based on Wireless Sensor Networks [J]. Netinfo Security, 2015, 15(3): 79-83. |
[11] | Gege QIU, Xueming WANG, Yansheng ZHANG. Research on WSN Identity Authentication Protocol Based on HECC [J]. Netinfo Security, 2015, 26(12): 54-58. |
[12] | . Research on Routing Algorithm of Wireless Sensor Network based on Link Quality [J]. , 2014, 14(5): 59-. |
[13] | . Reference-based Recoverable Concealed Data Aggregation in Heterogeneous Wireless Sensor Networks [J]. , 2014, 14(3): 74-. |
[14] | HUANG Qi, HUANG Hai, XIE Dong-qing. A Novel AOA Clustering-based Localization Algorithm with High Accuracy [J]. 信息网络安全, 2014, 14(12): 51-55. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||