False Event Message Detection Robust to Burst Attacks in Wireless Sensor Networks

A sensor device can be used to detect target events at low cost. Moreover, there is a significant risk of sensor nodes being compromised or captured within large wireless sensor networks (WSNs). The transmission of valid event messages to users by a WSN can be hindered by network congestion due to f...

Full description

Bibliographic Details
Main Authors: Yuichi Sei, Akihiko Ohsuga
Format: Article
Language:English
Published: IEEE 2022-01-01
Series:IEEE Open Journal of the Communications Society
Subjects:
Online Access:https://ieeexplore.ieee.org/document/9899494/
_version_ 1797996484991385600
author Yuichi Sei
Akihiko Ohsuga
author_facet Yuichi Sei
Akihiko Ohsuga
author_sort Yuichi Sei
collection DOAJ
description A sensor device can be used to detect target events at low cost. Moreover, there is a significant risk of sensor nodes being compromised or captured within large wireless sensor networks (WSNs). The transmission of valid event messages to users by a WSN can be hindered by network congestion due to false event messages in a compromised node. Several methods are available for detecting false event messages. However, they rely on long bits of authentication codes and hence do not provide a fundamental solution to prevent network congestion. In the proposed method, various hashing vectors, which are spaceefficient data structures that can determine whether the given data are an element of a set, are created based on the correct combination of authentication codes and placed in each node in advance. An event message contains an XOR of the authentication codes, and each node verifies it based on its hashing vector. If a node is acquired illegally, the information of the hashing vector and the XOR information of the authentication codes assigned to the correct event message is compromised, so we propose an algorithm to update the information securely. Compared to existing research, the number of hops required to detect a false event message increases by only about one hop, but the amount of traffic that a malicious node can generate can be reduced by about 60% or more. In other words, the proposed method effectively reduces the amount of traffic an attacker can generate with false event messages, which also reduces the overall network congestion.
first_indexed 2024-04-11T10:18:08Z
format Article
id doaj.art-4a8a80a539bc4915ac448d06b4d9e007
institution Directory Open Access Journal
issn 2644-125X
language English
last_indexed 2024-04-11T10:18:08Z
publishDate 2022-01-01
publisher IEEE
record_format Article
series IEEE Open Journal of the Communications Society
spelling doaj.art-4a8a80a539bc4915ac448d06b4d9e0072022-12-22T04:29:51ZengIEEEIEEE Open Journal of the Communications Society2644-125X2022-01-0131630164210.1109/OJCOMS.2022.32080889899494False Event Message Detection Robust to Burst Attacks in Wireless Sensor NetworksYuichi Sei0https://orcid.org/0000-0002-2552-6717Akihiko Ohsuga1https://orcid.org/0000-0001-6717-7028Department of Informatics, Graduate School of Informatics and Engineering, University of Electro-Communications, Tokyo, JapanDepartment of Informatics, Graduate School of Informatics and Engineering, University of Electro-Communications, Tokyo, JapanA sensor device can be used to detect target events at low cost. Moreover, there is a significant risk of sensor nodes being compromised or captured within large wireless sensor networks (WSNs). The transmission of valid event messages to users by a WSN can be hindered by network congestion due to false event messages in a compromised node. Several methods are available for detecting false event messages. However, they rely on long bits of authentication codes and hence do not provide a fundamental solution to prevent network congestion. In the proposed method, various hashing vectors, which are spaceefficient data structures that can determine whether the given data are an element of a set, are created based on the correct combination of authentication codes and placed in each node in advance. An event message contains an XOR of the authentication codes, and each node verifies it based on its hashing vector. If a node is acquired illegally, the information of the hashing vector and the XOR information of the authentication codes assigned to the correct event message is compromised, so we propose an algorithm to update the information securely. Compared to existing research, the number of hops required to detect a false event message increases by only about one hop, but the amount of traffic that a malicious node can generate can be reduced by about 60% or more. In other words, the proposed method effectively reduces the amount of traffic an attacker can generate with false event messages, which also reduces the overall network congestion.https://ieeexplore.ieee.org/document/9899494/Energy-efficient protocolfalse event detectionsecuritywireless sensor networks
spellingShingle Yuichi Sei
Akihiko Ohsuga
False Event Message Detection Robust to Burst Attacks in Wireless Sensor Networks
IEEE Open Journal of the Communications Society
Energy-efficient protocol
false event detection
security
wireless sensor networks
title False Event Message Detection Robust to Burst Attacks in Wireless Sensor Networks
title_full False Event Message Detection Robust to Burst Attacks in Wireless Sensor Networks
title_fullStr False Event Message Detection Robust to Burst Attacks in Wireless Sensor Networks
title_full_unstemmed False Event Message Detection Robust to Burst Attacks in Wireless Sensor Networks
title_short False Event Message Detection Robust to Burst Attacks in Wireless Sensor Networks
title_sort false event message detection robust to burst attacks in wireless sensor networks
topic Energy-efficient protocol
false event detection
security
wireless sensor networks
url https://ieeexplore.ieee.org/document/9899494/
work_keys_str_mv AT yuichisei falseeventmessagedetectionrobusttoburstattacksinwirelesssensornetworks
AT akihikoohsuga falseeventmessagedetectionrobusttoburstattacksinwirelesssensornetworks