Method for Detecting Manipulated Compilation of Sensing Reports in Wireless Sensor Networks

In cluster-based wireless sensor networks (WSNs), a few sensor nodes, including cluster heads (CHs), can be physically compromised by a malicious adversary. By using compromised CHs, the adversary can intentionally attach false message authentication codes into legitimate sensing reports in order to...

Full description

Saved in:
Bibliographic Details
Main Author: Hae Young Lee
Format: Article
Language:English
Published: Wiley 2015-01-01
Series:The Scientific World Journal
Online Access:http://dx.doi.org/10.1155/2015/493162
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1832559448892112896
author Hae Young Lee
author_facet Hae Young Lee
author_sort Hae Young Lee
collection DOAJ
description In cluster-based wireless sensor networks (WSNs), a few sensor nodes, including cluster heads (CHs), can be physically compromised by a malicious adversary. By using compromised CHs, the adversary can intentionally attach false message authentication codes into legitimate sensing reports in order to interrupt reporting of the real events. The existing solutions are vulnerable to such a type of security attacks, called manipulated compilation attacks (MCAs), since they assume that CHs are uncompromised. Thus, the reports manipulated by compromised CHs will be discarded by forwarding nodes or rejected at base stations, so that real events on the fields cannot be properly reported to the users. In this paper, the author proposes a method for the detection of MCAs in cluster-based WSNs. In the proposed method, every sensing report is collaboratively generated and verified by cluster nodes based on very loose synchronization. Once a cluster node has detected an MCA for a real event, it can reforward a legitimate report immediately. Therefore, the event can be properly reported to the users. The performance of the proposed method is shown with analytical and experimental results at the end of the paper.
format Article
id doaj-art-cfcdf636d88a44fba0ac47cb5e1c9c84
institution Kabale University
issn 2356-6140
1537-744X
language English
publishDate 2015-01-01
publisher Wiley
record_format Article
series The Scientific World Journal
spelling doaj-art-cfcdf636d88a44fba0ac47cb5e1c9c842025-02-03T01:30:01ZengWileyThe Scientific World Journal2356-61401537-744X2015-01-01201510.1155/2015/493162493162Method for Detecting Manipulated Compilation of Sensing Reports in Wireless Sensor NetworksHae Young Lee0Department of Information Security, Seoul Women’s University, 621 Hwarang-ro, Nowon-gu, Seoul 139-774, Republic of KoreaIn cluster-based wireless sensor networks (WSNs), a few sensor nodes, including cluster heads (CHs), can be physically compromised by a malicious adversary. By using compromised CHs, the adversary can intentionally attach false message authentication codes into legitimate sensing reports in order to interrupt reporting of the real events. The existing solutions are vulnerable to such a type of security attacks, called manipulated compilation attacks (MCAs), since they assume that CHs are uncompromised. Thus, the reports manipulated by compromised CHs will be discarded by forwarding nodes or rejected at base stations, so that real events on the fields cannot be properly reported to the users. In this paper, the author proposes a method for the detection of MCAs in cluster-based WSNs. In the proposed method, every sensing report is collaboratively generated and verified by cluster nodes based on very loose synchronization. Once a cluster node has detected an MCA for a real event, it can reforward a legitimate report immediately. Therefore, the event can be properly reported to the users. The performance of the proposed method is shown with analytical and experimental results at the end of the paper.http://dx.doi.org/10.1155/2015/493162
spellingShingle Hae Young Lee
Method for Detecting Manipulated Compilation of Sensing Reports in Wireless Sensor Networks
The Scientific World Journal
title Method for Detecting Manipulated Compilation of Sensing Reports in Wireless Sensor Networks
title_full Method for Detecting Manipulated Compilation of Sensing Reports in Wireless Sensor Networks
title_fullStr Method for Detecting Manipulated Compilation of Sensing Reports in Wireless Sensor Networks
title_full_unstemmed Method for Detecting Manipulated Compilation of Sensing Reports in Wireless Sensor Networks
title_short Method for Detecting Manipulated Compilation of Sensing Reports in Wireless Sensor Networks
title_sort method for detecting manipulated compilation of sensing reports in wireless sensor networks
url http://dx.doi.org/10.1155/2015/493162
work_keys_str_mv AT haeyounglee methodfordetectingmanipulatedcompilationofsensingreportsinwirelesssensornetworks