Detection of False Data Injection Attack in the Internet of Things

Article Preview

Abstract:

With the rapid development of ubiquitous network and its applications, the key technologies of the Internet of things are actively researched all over the world. The Internet of things has tremendous attraction for adversaries, and it is easily attacked due to poor resource and non-perfect distribution of sensor nodes, then false data maybe be injected into network. Security is one of the most important demands for applications in the Internet of things, an algorithm of malicious nodes detection is proposed to protect the network from destruction based on weighted confidence filter, namely, the cluster heads take charge of collecting messages from nodes and computing their average of confidence in cluster-based network, then they aggregate data from nodes with higher confidence than average and ignore the others, they update confidence of each node by comparing the aggregation value and the received data, and regard it as the weight of exactness of message from node. A sensor node is judged to be a malicious one if its weight is lower than the set threshold. The simulation results show that the algorithm can detect malicious nodes with high detection ratio, low false alarm ratio and outstanding scalability.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 452-453)

Pages:

932-936

Citation:

Online since:

January 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Wang Baoyun, Review on Internet of things, Journal of Electronic Measurement and Instrument, Vol. 12, (2009),P. 1-7.

Google Scholar

[2] Hu Xiangdong, Cai Dongqiang, Design and research of secure encryption clustering algorithm for wireless sensor networks, Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition), Vol. 21, No. 3, (2009),P. 421-424.

Google Scholar

[3] Zhou XW, Qin BP, Xu H, Wireless sensor networks and security, Beijing: National Defence Industry Press (2007).

Google Scholar

[4] Hu Xiangdong, Wei Qinfang, Tang Hui. Model and simulation of creditability-based data aggregation for the Internet of things. Chinese Journal of Scientific Instrument, Vol. 31, No. 11, (2010),P. 2636-2640.

Google Scholar

[5] Lang WM, Yang ZK, Wu SZ, Research on the security in wireless sensor network, Computer Science, (2005),P. 54-58.

Google Scholar

[6] Luo H, Zerfos P, Kong Ji, Self-securing Ad Hoc wireless networks, Proceedings of IEEE Symposium on Computers and Communications, Italy (2002).

DOI: 10.1109/iscc.2002.1021731

Google Scholar

[7] Curiac D-I, Banias O, Dragan F, Malicious node detection in wireless sensor networks using an autoregression technique, Proceedings of the 3rd International Conference on Networking and Services, June 19–25, (2007), Athens, Greece.

DOI: 10.1109/icns.2007.79

Google Scholar

[8] Curiac D-I, Plastoi M, Doboli A, Combined malicious node discovery and self-destruction technique for wireless sensor networks, Third International Conference on Sensor Technologies and Applications, (2009),P. 436-441.

DOI: 10.1109/sensorcomm.2009.72

Google Scholar

[9] Jing Qi, Tang Liyong, Chen Zhong, Trust Management in Wireless Sensor Networks Journal of Software, Vol. 19, No. 7, (2008),P. 1716-1730.

DOI: 10.3724/sp.j.1001.2008.01716

Google Scholar

[10] Deng Lili, Liu Caixing, Research and design on trusted models in wireless sensor networks, Sensor and Instruments, Vol. 26, No. 81, (2010),P. 100-103.

Google Scholar

[11] Atakli I, Hu H, Chen Y, Malicious node detection in wireless sensor networks using weighted trust evaluation, The Symposium on Simulation of Systems Security, April, (2008), P. 14-17.

Google Scholar