Bogus data filtering in sensor networks

Yong Ho Kim, Jong Hwan Park, Dong Hoon Lee, Jong In Lim

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Recently, Zhang et al. proposed a location-based threshold-endorsement scheme (LTE) to thwart bogus data injection attacks. This scheme exhibits much greater filtering power than earlier symmetric schemes and results in enhanced energy savings. In this paper, we show that LTE has a significant vulnerability. We also propose an improved scheme that mitigates this weakness and thereby achieves the original claims of Zhang et al. without lessening LTE's remarkable filtering power.

Original languageEnglish
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Pages629-635
Number of pages7
Volume4819 LNAI
Publication statusPublished - 2007 Dec 1
EventPacific-Asia Conference on Knowledge Discovery and Data Mining, PAKDD 2007 - Nanjing, China
Duration: 2007 May 222007 May 22

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4819 LNAI
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

OtherPacific-Asia Conference on Knowledge Discovery and Data Mining, PAKDD 2007
CountryChina
CityNanjing
Period07/5/2207/5/22

    Fingerprint

Keywords

  • Bogus data injection attack
  • Security
  • Wireless sensor networks

ASJC Scopus subject areas

  • Computer Science(all)
  • Biochemistry, Genetics and Molecular Biology(all)
  • Theoretical Computer Science

Cite this

Kim, Y. H., Park, J. H., Lee, D. H., & Lim, J. I. (2007). Bogus data filtering in sensor networks. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4819 LNAI, pp. 629-635). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 4819 LNAI).