Skip to main content
Erschienen in: Wireless Personal Communications 1/2017

25.04.2017

En-Route Filtering Techniques in Wireless Sensor Networks: A Survey

verfasst von: Alok Kumar, Alwyn Roshan Pais

Erschienen in: Wireless Personal Communications | Ausgabe 1/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Majority of wireless sensor networks (WSNs) are deployed in unattended environments and thus sensor nodes can be compromised easily. A compromised sensor node can be used to send fake sensing reports to the sink. If undetected these reports can raise false alarms. To deal with the problem of fake report generation, a number of en-route filtering schemes have been proposed. Each of these schemes uses different cryptographic methods to check the authenticity of reports while they are being forwarded hop by hop toward base station. However, majority of these techniques can handle only limited compromised nodes or they either need node localization or statically configured routes for sending reports. Furthermore, majority of en-route filtering techniques are vulnerable to various denial of service attacks. Our main aims in this survey are: (a) to describe the major en-route filtering techniques, (b) to analyze these techniques on various parameters including security and (c) to outline main unresolved research challenges in en-route filtering in WSNs.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Akkaya, K., & Younis, M. (2005). A survey on routing protocols for wireless sensor networks. Ad Hoc Networks, 3(3), 325–349.CrossRef Akkaya, K., & Younis, M. (2005). A survey on routing protocols for wireless sensor networks. Ad Hoc Networks, 3(3), 325–349.CrossRef
2.
Zurück zum Zitat Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). A survey on sensor networks. IEEE Communications Magazine, 40(8), 102–114.CrossRef Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). A survey on sensor networks. IEEE Communications Magazine, 40(8), 102–114.CrossRef
3.
Zurück zum Zitat Chi, S. H., & Cho, T. H. (2006). Fuzzy logic based propagation limiting method for message routing in wireless sensor networks. In Computational science and its applications-ICCSA 2006 (pp. 58–67). Springer. Chi, S. H., & Cho, T. H. (2006). Fuzzy logic based propagation limiting method for message routing in wireless sensor networks. In Computational science and its applications-ICCSA 2006 (pp. 58–67). Springer.
4.
Zurück zum Zitat He, S., Chen, J., Sun, Y., Yau, D. K., & Yip, N. K. (2010). On optimal information capture by energy-constrained mobile sensors. IEEE Transactions on Vehicular Technology, 59(5), 2472–2484.CrossRef He, S., Chen, J., Sun, Y., Yau, D. K., & Yip, N. K. (2010). On optimal information capture by energy-constrained mobile sensors. IEEE Transactions on Vehicular Technology, 59(5), 2472–2484.CrossRef
5.
Zurück zum Zitat Szewczyk, R., Mainwaring, A., Polastre, J., Anderson, J., & Culler, D. (2004). An analysis of a large scale habitat monitoring application. In Proceedings of the 2nd international conference on Embedded networked sensor systems (pp. 214–226). ACM (2004) Szewczyk, R., Mainwaring, A., Polastre, J., Anderson, J., & Culler, D. (2004). An analysis of a large scale habitat monitoring application. In Proceedings of the 2nd international conference on Embedded networked sensor systems (pp. 214–226). ACM (2004)
6.
Zurück zum Zitat Chan, H., & Perrig, A. (2003). Security and privacy in sensor networks. Computer, 36(10), 103–105.CrossRef Chan, H., & Perrig, A. (2003). Security and privacy in sensor networks. Computer, 36(10), 103–105.CrossRef
7.
Zurück zum Zitat Xing, K., & Cheng, X. (2010). From time domain to space domain: Detecting replica attacks in mobile ad hoc networks. In INFOCOM, 2010 proceedings IEEE (pp. 1–9). IEEE. Xing, K., & Cheng, X. (2010). From time domain to space domain: Detecting replica attacks in mobile ad hoc networks. In INFOCOM, 2010 proceedings IEEE (pp. 1–9). IEEE.
8.
Zurück zum Zitat Younan, Y., Philippaerts, P., Piessens, F., Joosen, W., Lachmund, S., & Walter, T. (2011). Filter-resistant code injection on arm. Journal in Computer Virology, 7(3), 173–188.CrossRef Younan, Y., Philippaerts, P., Piessens, F., Joosen, W., Lachmund, S., & Walter, T. (2011). Filter-resistant code injection on arm. Journal in Computer Virology, 7(3), 173–188.CrossRef
9.
Zurück zum Zitat Przydatek, B., Song, D., & Perrig, A. (2003). SIA: Secure information aggregation in sensor networks. In Proceedings of the 1st international conference on embedded networked sensor systems (pp. 255–265). ACM. Przydatek, B., Song, D., & Perrig, A. (2003). SIA: Secure information aggregation in sensor networks. In Proceedings of the 1st international conference on embedded networked sensor systems (pp. 255–265). ACM.
10.
Zurück zum Zitat Zhu, S., Setia, S., Jajodia, S., & Ning, P. (2004). An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks. In Proceedings of 2004 IEEE symposium on security and privacy, 2004 (pp. 259–271). IEEE. Zhu, S., Setia, S., Jajodia, S., & Ning, P. (2004). An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks. In Proceedings of 2004 IEEE symposium on security and privacy, 2004 (pp. 259–271). IEEE.
11.
Zurück zum Zitat Yang, Q., Yang, J., Yu, W., Zhang, N., & Zhao, W. (2011). On a hierarchical false data injection attack on power system state estimation. In 2011 IEEE Global Telecommunications Conference (GLOBECOM 2011) (pp. 1–5). IEEE. Yang, Q., Yang, J., Yu, W., Zhang, N., & Zhao, W. (2011). On a hierarchical false data injection attack on power system state estimation. In 2011 IEEE Global Telecommunications Conference (GLOBECOM 2011) (pp. 1–5). IEEE.
12.
Zurück zum Zitat Liu, Y., Ning, P., & Reiter, M. K. (2011). False data injection attacks against state estimation in electric power grids. ACM Transactions on Information and System Security (TISSEC), 14(1), 13.CrossRef Liu, Y., Ning, P., & Reiter, M. K. (2011). False data injection attacks against state estimation in electric power grids. ACM Transactions on Information and System Security (TISSEC), 14(1), 13.CrossRef
13.
Zurück zum Zitat Cárdenas, A. A., Amin, S., Lin, Z. S., Huang, Y. L., Huang, C. Y., & Sastry, S. (2011). Attacks against process control systems: Risk assessment, detection, and response. In Proceedings of the 6th ACM symposium on information, computer and communications security (pp. 355–366). ACM. Cárdenas, A. A., Amin, S., Lin, Z. S., Huang, Y. L., Huang, C. Y., & Sastry, S. (2011). Attacks against process control systems: Risk assessment, detection, and response. In Proceedings of the 6th ACM symposium on information, computer and communications security (pp. 355–366). ACM.
14.
Zurück zum Zitat Carman, D. W., Kruus, P. S., & Matt, B. J. (2000). Constraints and approaches for distributed sensor network security (final). DARPA project report (cryptographic Technologies Group, Trusted Information System, NAI Labs) (Vol. 1, no. 1). Carman, D. W., Kruus, P. S., & Matt, B. J. (2000). Constraints and approaches for distributed sensor network security (final). DARPA project report (cryptographic Technologies Group, Trusted Information System, NAI Labs) (Vol. 1, no. 1).
15.
Zurück zum Zitat Wood, A. D., & Stankovic, J. A. (2002). Denial of service in sensor networks. Computer, 35(10), 54–62.CrossRef Wood, A. D., & Stankovic, J. A. (2002). Denial of service in sensor networks. Computer, 35(10), 54–62.CrossRef
16.
Zurück zum Zitat Karlof, C., & Wagner, D. (2003). Secure routing in wireless sensor networks: Attacks and countermeasures. Ad Hoc Networks, 1(2), 293–315.CrossRef Karlof, C., & Wagner, D. (2003). Secure routing in wireless sensor networks: Attacks and countermeasures. Ad Hoc Networks, 1(2), 293–315.CrossRef
17.
Zurück zum Zitat Perrig, A., Szewczyk, R., Tygar, J. D., Wen, V., & Culler, D. E. (2002). Spins: Security protocols for sensor networks. Wireless Networks, 8(5), 521–534.MATHCrossRef Perrig, A., Szewczyk, R., Tygar, J. D., Wen, V., & Culler, D. E. (2002). Spins: Security protocols for sensor networks. Wireless Networks, 8(5), 521–534.MATHCrossRef
18.
Zurück zum Zitat Shi, E., & Perrig, A. (2004). Designing secure sensor networks. IEEE Wireless Communications, 11(6), 38–43.CrossRef Shi, E., & Perrig, A. (2004). Designing secure sensor networks. IEEE Wireless Communications, 11(6), 38–43.CrossRef
19.
Zurück zum Zitat Ye, F., Luo, H., Lu, S., & Zhang, L. (2005). Statistical en-route filtering of injected false data in sensor networks. IEEE Journal on Selected Areas in Communications, 23(4), 839–850.CrossRef Ye, F., Luo, H., Lu, S., & Zhang, L. (2005). Statistical en-route filtering of injected false data in sensor networks. IEEE Journal on Selected Areas in Communications, 23(4), 839–850.CrossRef
20.
Zurück zum Zitat Sun, C. I., Lee, H. Y., & Cho, T. H. (2009). A path selection method for improving the detection power of statistical filtering in sensor networks. Journal of Information Science and Engineering, 25(4), 1163–1175.MathSciNet Sun, C. I., Lee, H. Y., & Cho, T. H. (2009). A path selection method for improving the detection power of statistical filtering in sensor networks. Journal of Information Science and Engineering, 25(4), 1163–1175.MathSciNet
21.
Zurück zum Zitat Sun, Q., & Wu, M. (2011). A double key-sharing based false data filtering scheme in wireless sensor networks. In 2011 IEEE 10th international conference on trust, security and privacy in computing and communications (TrustCom) (pp. 509–516). IEEE. Sun, Q., & Wu, M. (2011). A double key-sharing based false data filtering scheme in wireless sensor networks. In 2011 IEEE 10th international conference on trust, security and privacy in computing and communications (TrustCom) (pp. 509–516). IEEE.
22.
Zurück zum Zitat Yang, H., Ye, F., Yuan, Y., Lu, S., & Arbaugh, W. (2005). Toward resilient security in wireless sensor networks. In Proceedings of the 6th ACM international symposium on mobile ad hoc networking and computing (pp. 34–45). ACM. Yang, H., Ye, F., Yuan, Y., Lu, S., & Arbaugh, W. (2005). Toward resilient security in wireless sensor networks. In Proceedings of the 6th ACM international symposium on mobile ad hoc networking and computing (pp. 34–45). ACM.
23.
Zurück zum Zitat Yu, L., & Li, J. (2009). Grouping-based resilient statistical en-route filtering for sensor networks. In INFOCOM 2009, IEEE (pp. 1782–1790). IEEE. Yu, L., & Li, J. (2009). Grouping-based resilient statistical en-route filtering for sensor networks. In INFOCOM 2009, IEEE (pp. 1782–1790). IEEE.
24.
Zurück zum Zitat Yang, H., & Lu, S. (2004). Commutative cipher based en-route filtering in wireless sensor networks. In 2004 IEEE 60th vehicular technology conference, 2004. VTC2004-fall (Vol. 2, pp. 1223–1227). IEEE. Yang, H., & Lu, S. (2004). Commutative cipher based en-route filtering in wireless sensor networks. In 2004 IEEE 60th vehicular technology conference, 2004. VTC2004-fall (Vol. 2, pp. 1223–1227). IEEE.
25.
Zurück zum Zitat Zhang, Y., Liu, W., Lou, W., & Fang, Y. (2006). Location-based compromise-tolerant security mechanisms for wireless sensor networks. IEEE Journal on Selected Areas in Communications, 24(2), 247–260.CrossRef Zhang, Y., Liu, W., Lou, W., & Fang, Y. (2006). Location-based compromise-tolerant security mechanisms for wireless sensor networks. IEEE Journal on Selected Areas in Communications, 24(2), 247–260.CrossRef
26.
Zurück zum Zitat Wang, H., & Li, Q. (2010). Achieving robust message authentication in sensor networks: A public-key based approach. Wireless Networks, 16(4), 999–1009.MathSciNetCrossRef Wang, H., & Li, Q. (2010). Achieving robust message authentication in sensor networks: A public-key based approach. Wireless Networks, 16(4), 999–1009.MathSciNetCrossRef
27.
Zurück zum Zitat Hankerson, D., Menezes, A. J., & Vanstone, S. (2006). Guide to elliptic curve cryptography. New York: Springer.MATH Hankerson, D., Menezes, A. J., & Vanstone, S. (2006). Guide to elliptic curve cryptography. New York: Springer.MATH
29.
Zurück zum Zitat Zargar, S. T., Joshi, J., & Tipper, D. (2013). A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks. IEEE Communications Surveys and Tutorials, 15(4), 2046–2069.CrossRef Zargar, S. T., Joshi, J., & Tipper, D. (2013). A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks. IEEE Communications Surveys and Tutorials, 15(4), 2046–2069.CrossRef
30.
Zurück zum Zitat Yu, B., & Xiao, B. (2006). Detecting selective forwarding attacks in wireless sensor networks. In 20th international parallel and distributed processing symposium, 2006. IPDPS 2006 (p. 8). IEEE. Yu, B., & Xiao, B. (2006). Detecting selective forwarding attacks in wireless sensor networks. In 20th international parallel and distributed processing symposium, 2006. IPDPS 2006 (p. 8). IEEE.
31.
Zurück zum Zitat Bauer, K., McCoy, D., Grunwald, D., Kohno, T., & Sicker, D. (2007). Low-resource routing attacks against tor. In Proceedings of the 2007 ACM workshop on privacy in electronic society (pp. 11–20). ACM. Bauer, K., McCoy, D., Grunwald, D., Kohno, T., & Sicker, D. (2007). Low-resource routing attacks against tor. In Proceedings of the 2007 ACM workshop on privacy in electronic society (pp. 11–20). ACM.
32.
Zurück zum Zitat Camtepe, S. A., & Yener, B. (2005). Key distribution mechanisms for wireless sensor networks: A survey. Rensselaer Polytechnic Institute, Troy, New York, Technical Report (pp. 05–07). Camtepe, S. A., & Yener, B. (2005). Key distribution mechanisms for wireless sensor networks: A survey. Rensselaer Polytechnic Institute, Troy, New York, Technical Report (pp. 05–07).
33.
Zurück zum Zitat Wang, Y., Attebury, G., & Ramamurthy, B. (2006). A survey of security issues in wireless sensor networks. IEEE Communications Surveys and Tutorials, 8(2), 2–23.CrossRef Wang, Y., Attebury, G., & Ramamurthy, B. (2006). A survey of security issues in wireless sensor networks. IEEE Communications Surveys and Tutorials, 8(2), 2–23.CrossRef
34.
Zurück zum Zitat Xiao, Y., Rayi, V. K., Sun, B., Du, X., Hu, F., & Galloway, M. (2007). A survey of key management schemes in wireless sensor networks. Computer Communications, 30(11), 2314–2341.CrossRef Xiao, Y., Rayi, V. K., Sun, B., Du, X., Hu, F., & Galloway, M. (2007). A survey of key management schemes in wireless sensor networks. Computer Communications, 30(11), 2314–2341.CrossRef
35.
Zurück zum Zitat Chen, X., Makki, K., Yen, K., & Pissinou, N. (2009). Sensor network security: A survey. IEEE Communications Surveys and Tutorials, 11(2), 52–73.CrossRef Chen, X., Makki, K., Yen, K., & Pissinou, N. (2009). Sensor network security: A survey. IEEE Communications Surveys and Tutorials, 11(2), 52–73.CrossRef
36.
Zurück zum Zitat Hussain, M. A., Khan, P., & Sup, K. K. (2009). WSN research activities for military application. In Proceedings of the 11th international conference on advanced communication technology (Vol. 1, pp. 271–274). IEEE Press. Hussain, M. A., Khan, P., & Sup, K. K. (2009). WSN research activities for military application. In Proceedings of the 11th international conference on advanced communication technology (Vol. 1, pp. 271–274). IEEE Press.
37.
Zurück zum Zitat Wenjie, C., Lifeng, C., Zhanglong, C., & Shiliang, T.: A realtime dynamic traffic control system based on wireless sensor network. In International conference workshops on parallel processing, 2005. ICPP 2005 workshops (pp. 258–264). IEEE. Wenjie, C., Lifeng, C., Zhanglong, C., & Shiliang, T.: A realtime dynamic traffic control system based on wireless sensor network. In International conference workshops on parallel processing, 2005. ICPP 2005 workshops (pp. 258–264). IEEE.
38.
Zurück zum Zitat Son, B., Her, Y. S., & Kim, J. G. (2006). A design and implementation of forest-fires surveillance system based on wireless sensor networks for South Korea mountains. International Journal of Computer Science and Network Security (IJCSNS), 6(9), 124–130. Son, B., Her, Y. S., & Kim, J. G. (2006). A design and implementation of forest-fires surveillance system based on wireless sensor networks for South Korea mountains. International Journal of Computer Science and Network Security (IJCSNS), 6(9), 124–130.
39.
Zurück zum Zitat Alemdar, H., & Ersoy, C. (2010). Wireless sensor networks for healthcare: A survey. Computer Networks, 54(15), 2688–2710.CrossRef Alemdar, H., & Ersoy, C. (2010). Wireless sensor networks for healthcare: A survey. Computer Networks, 54(15), 2688–2710.CrossRef
40.
Zurück zum Zitat Akhondi, M. R., Talevski, A., Carlsen, S., & Petersen, S. (2010). Applications of wireless sensor networks in the oil, gas and resources industries. In 2010 24th IEEE international conference on advanced information networking and applications (AINA) (pp. 941–948). IEEE. Akhondi, M. R., Talevski, A., Carlsen, S., & Petersen, S. (2010). Applications of wireless sensor networks in the oil, gas and resources industries. In 2010 24th IEEE international conference on advanced information networking and applications (AINA) (pp. 941–948). IEEE.
41.
Zurück zum Zitat Potyrailo, R. A., Nagraj, N., Surman, C., Boudries, H., Lai, H., Slocik, J. M., et al. (2012). Wireless sensors and sensor networks for homeland security applications. TrAC Trends in Analytical Chemistry, 40, 133–145.CrossRef Potyrailo, R. A., Nagraj, N., Surman, C., Boudries, H., Lai, H., Slocik, J. M., et al. (2012). Wireless sensors and sensor networks for homeland security applications. TrAC Trends in Analytical Chemistry, 40, 133–145.CrossRef
42.
Zurück zum Zitat Vogt, H. (2004). Exploring message authentication in sensor networks. In C. Castelluccia, H. Hartenstein, C. Paar, & D. Westhoff (Eds.), Security in ad-hoc and sensor networks (pp. 19–30). Berlin, Heidelberg: Springer. Vogt, H. (2004). Exploring message authentication in sensor networks. In C. Castelluccia, H. Hartenstein, C. Paar, & D. Westhoff (Eds.), Security in ad-hoc and sensor networks (pp. 19–30). Berlin, Heidelberg: Springer.
43.
Zurück zum Zitat Xin-Sheng, W., Yong-Zhao, Z., Shu-Ming, X., & Liang-Min, W. (2009). Lightweight defense scheme against selective forwarding attacks in wireless sensor networks. In International conference on cyber-enabled distributed computing and knowledge discovery, 2009. CyberC’09 (pp. 226–232). IEEE. Xin-Sheng, W., Yong-Zhao, Z., Shu-Ming, X., & Liang-Min, W. (2009). Lightweight defense scheme against selective forwarding attacks in wireless sensor networks. In International conference on cyber-enabled distributed computing and knowledge discovery, 2009. CyberC’09 (pp. 226–232). IEEE.
44.
Zurück zum Zitat Kaplantzis, S., Shilton, A., Mani, N., & Şekercioğlu, Y. A. (2007). Detecting selective forwarding attacks in wireless sensor networks using support vector machines. In 3rd international conference on intelligent sensors, sensor networks and information, 2007. ISSNIP 2007 (pp. 335–340). IEEE. Kaplantzis, S., Shilton, A., Mani, N., & Şekercioğlu, Y. A. (2007). Detecting selective forwarding attacks in wireless sensor networks using support vector machines. In 3rd international conference on intelligent sensors, sensor networks and information, 2007. ISSNIP 2007 (pp. 335–340). IEEE.
45.
Zurück zum Zitat Hu, Y. C., Perrig, A., & Johnson, D. B. (2003). Packet leashes: A defense against wormhole attacks in wireless networks. In INFOCOM 2003. Twenty-second annual joint conference of the IEEE computer and communications. IEEE societies (Vol. 3, pp. 1976–1986). IEEE. Hu, Y. C., Perrig, A., & Johnson, D. B. (2003). Packet leashes: A defense against wormhole attacks in wireless networks. In INFOCOM 2003. Twenty-second annual joint conference of the IEEE computer and communications. IEEE societies (Vol. 3, pp. 1976–1986). IEEE.
46.
Zurück zum Zitat Newsome, J., Shi, E., Song, D., & Perrig, A. (2004). The sybil attack in sensor networks: analysis and defenses. In Proceedings of the 3rd international symposium on Information processing in sensor networks (pp. 259–268). ACM. Newsome, J., Shi, E., Song, D., & Perrig, A. (2004). The sybil attack in sensor networks: analysis and defenses. In Proceedings of the 3rd international symposium on Information processing in sensor networks (pp. 259–268). ACM.
47.
Zurück zum Zitat Hamid, M. A., Mamun-Or-Rashid, M., & Hong, C. S. (2006). Routing security in sensor network: HELLO flood attack and defense (pp. 77–81). Dhaka, Bangaladesh: Proceedings of IEEE ICNEWS. Hamid, M. A., Mamun-Or-Rashid, M., & Hong, C. S. (2006). Routing security in sensor network: HELLO flood attack and defense (pp. 77–81). Dhaka, Bangaladesh: Proceedings of IEEE ICNEWS.
48.
Zurück zum Zitat Hu, Y., Lin, Y., Liu, Y., & Zeng, W. (2007). RAS: A robust authentication scheme for filtering false data in wireless sensor networks. In 15th IEEE international conference on networks, 2007. ICON 2007. (pp. 200–205). IEEE. Hu, Y., Lin, Y., Liu, Y., & Zeng, W. (2007). RAS: A robust authentication scheme for filtering false data in wireless sensor networks. In 15th IEEE international conference on networks, 2007. ICON 2007. (pp. 200–205). IEEE.
49.
Zurück zum Zitat Bloom, B. H. (1970). Space/time trade-offs in hash coding with allowable errors. Communications of the ACM, 13(7), 422–426.MATHCrossRef Bloom, B. H. (1970). Space/time trade-offs in hash coding with allowable errors. Communications of the ACM, 13(7), 422–426.MATHCrossRef
50.
Zurück zum Zitat Choi, H. M., Nam, S. M., Cho, T. H., et al. (2013). A secure routing method for detecting false reports and wormhole attacks in wireless sensor networks. Wireless Sensor Network, 5(03), 33.CrossRef Choi, H. M., Nam, S. M., Cho, T. H., et al. (2013). A secure routing method for detecting false reports and wormhole attacks in wireless sensor networks. Wireless Sensor Network, 5(03), 33.CrossRef
51.
Zurück zum Zitat Liu, Z., Wang, J., Zhang, S., Liu, H., & Zhang, X. (2014). A cluster-based false data filtering scheme in wireless sensor networks. Adhoc and Sensor Wireless Networks, 23(01), 21–45. Liu, Z., Wang, J., Zhang, S., Liu, H., & Zhang, X. (2014). A cluster-based false data filtering scheme in wireless sensor networks. Adhoc and Sensor Wireless Networks, 23(01), 21–45.
52.
Zurück zum Zitat Royer, E. M., & Toh, C. K. (1999). A review of current routing protocols for ad hoc mobile wireless networks. IEEE Personal Communications, 6(2), 46–55.CrossRef Royer, E. M., & Toh, C. K. (1999). A review of current routing protocols for ad hoc mobile wireless networks. IEEE Personal Communications, 6(2), 46–55.CrossRef
53.
Zurück zum Zitat Tsudik, G. (1992). Message authentication with one-way hash functions. ACM SIGCOMM Computer Communication Review, 22(5), 29–38.CrossRef Tsudik, G. (1992). Message authentication with one-way hash functions. ACM SIGCOMM Computer Communication Review, 22(5), 29–38.CrossRef
54.
Zurück zum Zitat Ren, K., Lou, W., & Zhang, Y. (2008). Leds: Providing location-aware end-to-end data security in wireless sensor networks. IEEE Transactions on Mobile Computing, 7(5), 585–598.CrossRef Ren, K., Lou, W., & Zhang, Y. (2008). Leds: Providing location-aware end-to-end data security in wireless sensor networks. IEEE Transactions on Mobile Computing, 7(5), 585–598.CrossRef
55.
Zurück zum Zitat Fakhrey, H., Tiwari, R., Johnston, M., & Al-Mathehaji, Y. A. (2016). The optimum design of location-dependent key management protocol for a WSN with a random selected cell reporter. IEEE Sensors Journal, 16(19), 7217–7226.CrossRef Fakhrey, H., Tiwari, R., Johnston, M., & Al-Mathehaji, Y. A. (2016). The optimum design of location-dependent key management protocol for a WSN with a random selected cell reporter. IEEE Sensors Journal, 16(19), 7217–7226.CrossRef
56.
Zurück zum Zitat Wang, J., Liu, Z., Zhang, S., & Zhang, X. (2014). Defending collaborative false data injection attacks in wireless sensor networks. Information Sciences, 254, 39–53.MathSciNetCrossRef Wang, J., Liu, Z., Zhang, S., & Zhang, X. (2014). Defending collaborative false data injection attacks in wireless sensor networks. Information Sciences, 254, 39–53.MathSciNetCrossRef
57.
Zurück zum Zitat Rabaey, C. S. J., & Langendoen, K. (2002). Robust positioning algorithms for distributed ad-hoc wireless sensor networks. In USENIX technical annual conference (pp. 317–327). Rabaey, C. S. J., & Langendoen, K. (2002). Robust positioning algorithms for distributed ad-hoc wireless sensor networks. In USENIX technical annual conference (pp. 317–327).
58.
Zurück zum Zitat Patwari, N., Hero, A. O, I. I. I., Perkins, M., Correal, N. S., & O’dea, R. J. (2003). Relative location estimation in wireless sensor networks. IEEE Transactions on Signal Processing, 51(8), 2137–2148.CrossRef Patwari, N., Hero, A. O, I. I. I., Perkins, M., Correal, N. S., & O’dea, R. J. (2003). Relative location estimation in wireless sensor networks. IEEE Transactions on Signal Processing, 51(8), 2137–2148.CrossRef
59.
Zurück zum Zitat Nam, S. M., & Cho, T. H. (2016). Context-aware architecture for probabilistic voting-based filtering scheme in sensor networks. IEEE Transactions on Mobile Computing. doi:10.1109/TMC.2016.2641219. Nam, S. M., & Cho, T. H. (2016). Context-aware architecture for probabilistic voting-based filtering scheme in sensor networks. IEEE Transactions on Mobile Computing. doi:10.​1109/​TMC.​2016.​2641219.
60.
Zurück zum Zitat Li, F., & Wu, J. (2006). A probabilistic voting-based filtering scheme in wireless sensor networks. In Proceedings of the 2006 international conference on Wireless communications and mobile computing (pp. 27–32). ACM. Li, F., & Wu, J. (2006). A probabilistic voting-based filtering scheme in wireless sensor networks. In Proceedings of the 2006 international conference on Wireless communications and mobile computing (pp. 27–32). ACM.
61.
Zurück zum Zitat Yu, Z., & Guan, Y. (2010). A dynamic en-route filtering scheme for data reporting in wireless sensor networks. IEEE/ACM Transactions on Networking, 18(1), 150–163.MathSciNetCrossRef Yu, Z., & Guan, Y. (2010). A dynamic en-route filtering scheme for data reporting in wireless sensor networks. IEEE/ACM Transactions on Networking, 18(1), 150–163.MathSciNetCrossRef
62.
Zurück zum Zitat Yuan, T., Zhang, S., Zhong, Y., & Ma, J. (2008). KAEF: An en-route scheme of filtering false data in wireless sensor networks. In IEEE International performance, computing and communications conference, 2008. IPCCC 2008 (pp. 193–200). IEEE. Yuan, T., Zhang, S., Zhong, Y., & Ma, J. (2008). KAEF: An en-route scheme of filtering false data in wireless sensor networks. In IEEE International performance, computing and communications conference, 2008. IPCCC 2008 (pp. 193–200). IEEE.
63.
Zurück zum Zitat Lamport, L. (1981). Password authentication with insecure communication. Communications of the ACM, 24(11), 770–772.MathSciNetCrossRef Lamport, L. (1981). Password authentication with insecure communication. Communications of the ACM, 24(11), 770–772.MathSciNetCrossRef
64.
Zurück zum Zitat Zhu, S., Setia, S., & Jajodia, S. (2006). Leap+: Efficient security mechanisms for large-scale distributed sensor networks. ACM Transactions on Sensor Networks (TOSN), 2(4), 500–528.CrossRef Zhu, S., Setia, S., & Jajodia, S. (2006). Leap+: Efficient security mechanisms for large-scale distributed sensor networks. ACM Transactions on Sensor Networks (TOSN), 2(4), 500–528.CrossRef
65.
Zurück zum Zitat Yang, X., Lin, J., Yu, W., Moulema, P. M., Fu, X., & Zhao, W. (2015). A novel en-route filtering scheme against false data injection attacks in cyber-physical networked systems. IEEE Transactions on Computers, 64(1), 4–18.MathSciNetMATHCrossRef Yang, X., Lin, J., Yu, W., Moulema, P. M., Fu, X., & Zhao, W. (2015). A novel en-route filtering scheme against false data injection attacks in cyber-physical networked systems. IEEE Transactions on Computers, 64(1), 4–18.MathSciNetMATHCrossRef
66.
Zurück zum Zitat Kraub, C., Schneider, M., Bayarou, K., & Eckert, C. (2007). STEF: A secure ticket-based en-route filtering scheme for wireless sensor networks. In: The second international conference on Availability, reliability and security, 2007. ARES 2007 (pp. 310–317). IEEE. Kraub, C., Schneider, M., Bayarou, K., & Eckert, C. (2007). STEF: A secure ticket-based en-route filtering scheme for wireless sensor networks. In: The second international conference on Availability, reliability and security, 2007. ARES 2007 (pp. 310–317). IEEE.
67.
Zurück zum Zitat Ma, J., Zhang, S., Zhong, Y., & Tong, X. (2006). SeLoc: Secure localization for wireless sensor and actor network. In 2006 IEEE international conference on mobile adhoc and sensor systems (MASS) (pp. 864–869). IEEE. Ma, J., Zhang, S., Zhong, Y., & Tong, X. (2006). SeLoc: Secure localization for wireless sensor and actor network. In 2006 IEEE international conference on mobile adhoc and sensor systems (MASS) (pp. 864–869). IEEE.
68.
Zurück zum Zitat Sastry, N., Shankar, U., & Wagner, D. (2003). Secure verification of location claims. In Proceedings of the 2nd ACM workshop on wireless security (pp. 1–10). ACM. Sastry, N., Shankar, U., & Wagner, D. (2003). Secure verification of location claims. In Proceedings of the 2nd ACM workshop on wireless security (pp. 1–10). ACM.
69.
Zurück zum Zitat Chan, H., Luk, M., & Perrig, A. (2005). Using clustering information for sensor network localization. In V. K. Prasanna, S. S. Iyengar, P. G. Spirakis, & M. Welsh (Eds.), Distributed computing in sensor systems (pp. 109–125). Berlin, Heidelberg: Springer.CrossRef Chan, H., Luk, M., & Perrig, A. (2005). Using clustering information for sensor network localization. In V. K. Prasanna, S. S. Iyengar, P. G. Spirakis, & M. Welsh (Eds.), Distributed computing in sensor systems (pp. 109–125). Berlin, Heidelberg: Springer.CrossRef
70.
Zurück zum Zitat Eschenauer, L., & Gligor, V. D. (2002). A key-management scheme for distributed sensor networks. In Proceedings of the 9th ACM conference on computer and communications security (pp. 41–47). ACM. Eschenauer, L., & Gligor, V. D. (2002). A key-management scheme for distributed sensor networks. In Proceedings of the 9th ACM conference on computer and communications security (pp. 41–47). ACM.
71.
Zurück zum Zitat Chan, H., Perrig, A., & Song, D. (2003). Random key predistribution schemes for sensor networks. In Proceedings of 2003 symposium on security and privacy, 2003 (pp. 197–213). IEEE. Chan, H., Perrig, A., & Song, D. (2003). Random key predistribution schemes for sensor networks. In Proceedings of 2003 symposium on security and privacy, 2003 (pp. 197–213). IEEE.
72.
Zurück zum Zitat Liu, D., Ning, P., & Li, R. (2005). Establishing pairwise keys in distributed sensor networks. ACM Transactions on Information and System Security (TISSEC), 8(1), 41–77.CrossRef Liu, D., Ning, P., & Li, R. (2005). Establishing pairwise keys in distributed sensor networks. ACM Transactions on Information and System Security (TISSEC), 8(1), 41–77.CrossRef
73.
Zurück zum Zitat Luk, M., Perrig, A., & Whillock, B. (2006). Seven cardinal properties of sensor network broadcast authentication. In Proceedings of the fourth ACM workshop on security of ad hoc and sensor networks (pp. 147–156). ACM. Luk, M., Perrig, A., & Whillock, B. (2006). Seven cardinal properties of sensor network broadcast authentication. In Proceedings of the fourth ACM workshop on security of ad hoc and sensor networks (pp. 147–156). ACM.
74.
Zurück zum Zitat Chen, Y. S., & Lei, C. L. (2010). Filtering false messages en-route in wireless multi-hop networks. In 2010 IEEE wireless communications and networking conference (WCNC) (pp. 1–6). IEEE. Chen, Y. S., & Lei, C. L. (2010). Filtering false messages en-route in wireless multi-hop networks. In 2010 IEEE wireless communications and networking conference (WCNC) (pp. 1–6). IEEE.
75.
Zurück zum Zitat Dharmapurikar, S., Krishnamurthy, P., Sproull, T., & Lockwood, J. (2003). Deep packet inspection using parallel bloom filters. In Proceedings of 11th symposium on high performance interconnects, 2003 (pp. 44–51). IEEE. Dharmapurikar, S., Krishnamurthy, P., Sproull, T., & Lockwood, J. (2003). Deep packet inspection using parallel bloom filters. In Proceedings of 11th symposium on high performance interconnects, 2003 (pp. 44–51). IEEE.
76.
Zurück zum Zitat Lu, R., Lin, X., Zhu, H., Liang, X., & Shen, X. (2012). Becan: A bandwidth-efficient cooperative authentication scheme for filtering injected false data in wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 23(1), 32–43.CrossRef Lu, R., Lin, X., Zhu, H., Liang, X., & Shen, X. (2012). Becan: A bandwidth-efficient cooperative authentication scheme for filtering injected false data in wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 23(1), 32–43.CrossRef
77.
Zurück zum Zitat Liu, A., & Ning, P. (2008). TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks. In International conference on information processing in sensor networks, 2008. IPSN’08 (pp. 245–256). IEEE. Liu, A., & Ning, P. (2008). TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks. In International conference on information processing in sensor networks, 2008. IPSN’08 (pp. 245–256). IEEE.
78.
Zurück zum Zitat Wang, H., Sheng, B., Tan, C. C., & Li, Q. (2008). Comparing symmetric-key and public-key based security schemes in sensor networks: A case study of user access control. In The 28th international conference on distributed computing systems, 2008. ICDCS’08 (pp. 11–18). IEEE. Wang, H., Sheng, B., Tan, C. C., & Li, Q. (2008). Comparing symmetric-key and public-key based security schemes in sensor networks: A case study of user access control. In The 28th international conference on distributed computing systems, 2008. ICDCS’08 (pp. 11–18). IEEE.
79.
Zurück zum Zitat Yu, H., & He, J. (2013). Authentication and en-route data filtering for wireless sensor networks in the internet of things scenario. International Journal of Grid and Distributed Computing, 6(1), 1–12. Yu, H., & He, J. (2013). Authentication and en-route data filtering for wireless sensor networks in the internet of things scenario. International Journal of Grid and Distributed Computing, 6(1), 1–12.
80.
81.
Zurück zum Zitat Čapkun, S., & Hubaux, J. P. (2005). Secure positioning of wireless devices with application to sensor networks. In Proceedings of IEEE INFOCOM 2005. 24th annual joint conference of the IEEE computer and communications societies (Vol. 3, pp. 1917–1928). IEEE. Čapkun, S., & Hubaux, J. P. (2005). Secure positioning of wireless devices with application to sensor networks. In Proceedings of IEEE INFOCOM 2005. 24th annual joint conference of the IEEE computer and communications societies (Vol. 3, pp. 1917–1928). IEEE.
82.
Zurück zum Zitat Lazos, L., & Poovendran, R. (2004). SeRLoc: Secure range-independent localization for wireless sensor networks. In Proceedings of the 3rd ACM workshop on wireless security (pp. 21–30). ACM. Lazos, L., & Poovendran, R. (2004). SeRLoc: Secure range-independent localization for wireless sensor networks. In Proceedings of the 3rd ACM workshop on wireless security (pp. 21–30). ACM.
83.
Zurück zum Zitat Lazos, L., Poovendran, R., & Čapkun, S. (2005). Rope: Robust position estimation in wireless sensor networks. In Proceedings of the 4th international symposium on Information processing in sensor networks (p. 43). IEEE Press. Lazos, L., Poovendran, R., & Čapkun, S. (2005). Rope: Robust position estimation in wireless sensor networks. In Proceedings of the 4th international symposium on Information processing in sensor networks (p. 43). IEEE Press.
84.
Zurück zum Zitat Karp, B., & Kung, H. T. (2000). GPSR: Greedy perimeter stateless routing for wireless networks. In Proceedings of the 6th annual international conference on Mobile computing and networking (pp. 243–254). ACM. Karp, B., & Kung, H. T. (2000). GPSR: Greedy perimeter stateless routing for wireless networks. In Proceedings of the 6th annual international conference on Mobile computing and networking (pp. 243–254). ACM.
85.
Zurück zum Zitat Yu, Y., Govindan, R., & Estrin, D. (2001). Geographical and energy aware routing: A recursive data dissemination protocol for wireless sensor networks. Yu, Y., Govindan, R., & Estrin, D. (2001). Geographical and energy aware routing: A recursive data dissemination protocol for wireless sensor networks.
86.
Zurück zum Zitat Marti, S., Giuli, T. J., Lai, K., & Baker, M. (2000). Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of the 6th annual international conference on mobile computing and networking (pp. 255–265). ACM. Marti, S., Giuli, T. J., Lai, K., & Baker, M. (2000). Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of the 6th annual international conference on mobile computing and networking (pp. 255–265). ACM.
87.
Zurück zum Zitat Qadir, J., & Hasan, O. (2015). Applying formal methods to networking: Theory, techniques, and applications. IEEE Communications Surveys and Tutorials, 17(1), 256–291.CrossRef Qadir, J., & Hasan, O. (2015). Applying formal methods to networking: Theory, techniques, and applications. IEEE Communications Surveys and Tutorials, 17(1), 256–291.CrossRef
88.
Zurück zum Zitat De Moura, L., & Bjørner, N. (2008) Z3: An efficient SMT solver. In International conference on tools and algorithms for the construction and analysis of systems (pp. 337–340). Springer. De Moura, L., & Bjørner, N. (2008) Z3: An efficient SMT solver. In International conference on tools and algorithms for the construction and analysis of systems (pp. 337–340). Springer.
89.
Zurück zum Zitat Nipkow, T., Paulson, L. C., & Wenzel, M. (2002). Isabelle/HOL: A proof assistant for higher-order logic (Vol. 2283). New York: Springer.MATH Nipkow, T., Paulson, L. C., & Wenzel, M. (2002). Isabelle/HOL: A proof assistant for higher-order logic (Vol. 2283). New York: Springer.MATH
90.
Zurück zum Zitat Holzmann, G. (2003). Spin model checker, the: Primer and reference manual. Boston: Addison-Wesley. Holzmann, G. (2003). Spin model checker, the: Primer and reference manual. Boston: Addison-Wesley.
91.
Zurück zum Zitat Xie, G. G., Zhan, J., Maltz, D. A., Zhang, H., Greenberg, A., Hjalmtysson, G., & Rexford, J.: On static reachability analysis of ip networks. In Proceedings of IEEE INFOCOM 2005. 24th annual joint conference of the IEEE computer and communications societies (Vol. 3, pp. 2170–2183). IEEE. Xie, G. G., Zhan, J., Maltz, D. A., Zhang, H., Greenberg, A., Hjalmtysson, G., & Rexford, J.: On static reachability analysis of ip networks. In Proceedings of IEEE INFOCOM 2005. 24th annual joint conference of the IEEE computer and communications societies (Vol. 3, pp. 2170–2183). IEEE.
92.
Zurück zum Zitat Narain, S., et al. (2005). Network configuration management via model finding. LISA, 5, 15–15. Narain, S., et al. (2005). Network configuration management via model finding. LISA, 5, 15–15.
93.
Zurück zum Zitat Singh, V. P., Jain, S., Singhai, J. (2010). Hello flood attack and its countermeasures in wireless sensor networks. IJCSI International Journal of Computer Science Issues, 7(11), 23–27. Singh, V. P., Jain, S., Singhai, J. (2010). Hello flood attack and its countermeasures in wireless sensor networks. IJCSI International Journal of Computer Science Issues, 7(11), 23–27.
Metadaten
Titel
En-Route Filtering Techniques in Wireless Sensor Networks: A Survey
verfasst von
Alok Kumar
Alwyn Roshan Pais
Publikationsdatum
25.04.2017
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 1/2017
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-017-4197-0

Weitere Artikel der Ausgabe 1/2017

Wireless Personal Communications 1/2017 Zur Ausgabe

Neuer Inhalt