SlideShare a Scribd company logo
A NovelEn-RouteFiltering Scheme Against False DataInjection Attacks
in Cyber-Physical Networked Systems
Abstract:
In Cyber-Physical Networked Systems (CPNS), the adversary can inject
false measurements into the controller through compromised sensor nodes,
which not only threaten the security of the system, but also
consume network resources. To deal with this issue, a number of en-route
filtering schemes have been designed for wireless sensor networks.
However, these schemes either lack resilience to the number of
compromised nodes or depend on the statically configured routes and
node localization, which are not suitable for CPNS. In this paper, we
propose a Polynomial-based Compromise-Resilient En-route Filtering
scheme (PCREF), which can filter false injected data effectively and achieve
a high resilience to the number of compromised nodes without relying on
static routes and node localization. PCREF adopts polynomials instead of
Message Authentication Codes (MACs) for endorsing measurement
reports to achieve resilience to attacks. Each node stores two types of
polynomials: authentication polynomial and check polynomial, derived
from the primitive polynomial, and used for endorsing and verifying the
measurement reports. Through extensive theoretical analysis and
experiments, our data shows that PCREF achieves better filtering capacity
and resilience to the large number of compromised nodes in comparison to
the existing schemes.

More Related Content

What's hot (16)

DOC
Real time misbehavior detection in ieee 802.11-based wireless networks an ana...
Papitha Velumani
 
PPT
The Spark
guest5b4748
 
PDF
IMPROVEMENT OF FALSE REPORT DETECTION PERFORMANCE BASED ON INVALID DATA DETEC...
IJCNCJournal
 
DOCX
JPN1402 A Study on False Channel Condition Reporting Attacks in Wireless Ne...
chennaijp
 
PDF
Anomalous payload based network intrusion detection
UltraUploader
 
PDF
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
IJNSA Journal
 
PPTX
Enhanced Adaptive ACKnowledgment (EAACK)
AAKASH S
 
PDF
Filtering Schemes for Injected False Data in Wsn
IOSR Journals
 
PDF
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Editor IJCATR
 
PDF
A KEY LEVEL SELECTION WITHIN HASH CHAINS FOR THE EFFICIENT ENERGY CONSUMPTION...
ijasa
 
PDF
A1803060110
IOSR Journals
 
DOCX
Emap expedite message authentication protocol for vehicular ad hoc networks
JPINFOTECH JAYAPRAKASH
 
DOCX
containing byzantine failures with control zones
vishnuRajan20
 
DOCX
Deep representations for iris, face, and fingerprint spoofing detection
I3E Technologies
 
PDF
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
ranjith kumar
 
PDF
Message Authentication And Source Privacy Using BAC Technique In Wireless Sen...
theijes
 
Real time misbehavior detection in ieee 802.11-based wireless networks an ana...
Papitha Velumani
 
The Spark
guest5b4748
 
IMPROVEMENT OF FALSE REPORT DETECTION PERFORMANCE BASED ON INVALID DATA DETEC...
IJCNCJournal
 
JPN1402 A Study on False Channel Condition Reporting Attacks in Wireless Ne...
chennaijp
 
Anomalous payload based network intrusion detection
UltraUploader
 
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
IJNSA Journal
 
Enhanced Adaptive ACKnowledgment (EAACK)
AAKASH S
 
Filtering Schemes for Injected False Data in Wsn
IOSR Journals
 
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Editor IJCATR
 
A KEY LEVEL SELECTION WITHIN HASH CHAINS FOR THE EFFICIENT ENERGY CONSUMPTION...
ijasa
 
A1803060110
IOSR Journals
 
Emap expedite message authentication protocol for vehicular ad hoc networks
JPINFOTECH JAYAPRAKASH
 
containing byzantine failures with control zones
vishnuRajan20
 
Deep representations for iris, face, and fingerprint spoofing detection
I3E Technologies
 
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
ranjith kumar
 
Message Authentication And Source Privacy Using BAC Technique In Wireless Sen...
theijes
 

Viewers also liked (11)

DOCX
N te q6 7a team project wiki space
dirtbags2
 
DOC
COURSE TUTOR
Paul Archenoul
 
DOCX
A novel fading model for channels with multiple dominant specular components
ieeeprojectsbangalore
 
PPTX
Grande a partir de lo peueño
Monte de Dios
 
PPTX
Pilares convergencia (1)
LKAGUIZA
 
DOCX
Window covering industry brochure) rev. a
Ernie Gonzalez
 
PPTX
Russia for Tourists
Dasha Chizhova
 
DOCX
A new approach to precipitation monitoring a critical survey of existing tech...
ieeeprojectsbangalore
 
PDF
Sweet Sensations
Daniiela Rodriguez Useche
 
DOCX
La evolucion de la tecnologia y su influencia en la sociedad
yersiestefania
 
PPTX
Wash n flush CCAT
Kekai Tanaka
 
N te q6 7a team project wiki space
dirtbags2
 
COURSE TUTOR
Paul Archenoul
 
A novel fading model for channels with multiple dominant specular components
ieeeprojectsbangalore
 
Grande a partir de lo peueño
Monte de Dios
 
Pilares convergencia (1)
LKAGUIZA
 
Window covering industry brochure) rev. a
Ernie Gonzalez
 
Russia for Tourists
Dasha Chizhova
 
A new approach to precipitation monitoring a critical survey of existing tech...
ieeeprojectsbangalore
 
Sweet Sensations
Daniiela Rodriguez Useche
 
La evolucion de la tecnologia y su influencia en la sociedad
yersiestefania
 
Wash n flush CCAT
Kekai Tanaka
 
Ad

Similar to A novel en route filtering scheme against false data injection attacks in cyber-physical networked systems (20)

PDF
IEEE 2015 NS2 Projects
Vijay Karan
 
PDF
IEEE 2015 NS2 Projects
Vijay Karan
 
PDF
An Enhanced Detection and Energy-Efficient En-Route Filtering Scheme in Wirel...
ieijjournal
 
PDF
AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...
ieijjournal
 
PDF
Data security tolerance and portable based energy-efficient framework in sens...
Venu Madhav
 
PDF
3 Elsevier Venu Mar 2022.pdf
Venu Madhav
 
PDF
A Method of Improving Energy Efficiency Through Geofencing and False Data Blo...
IJCNCJournal
 
PDF
Efficient detection of faults and false data injection attacks in smart grid ...
International Journal of Power Electronics and Drive Systems (IJPEDS)
 
DOCX
A distributed fault intrusion tolerant sensor
IMPULSE_TECHNOLOGY
 
PDF
Counter Counter-Measures against Stealth Attacks on State Estimation in Smart...
Sung-Fu Han
 
PDF
PREVENTION METHOD OF FALSE REPORT GENERATION IN CLUSTER HEADS FOR DYNAMIC E...
AIRCC Publishing Corporation
 
PDF
PREVENTION METHOD OF FALSE REPORT GENERATION IN CLUSTER HEADS FOR DYNAMIC EN-...
ijcsit
 
PDF
Prevention Method of False Report Generation in Cluser Heads for Dynamic En-R...
AIRCC Publishing Corporation
 
DOCX
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On false-data-injection-attacks-...
IEEEGLOBALSOFTSTUDENTPROJECTS
 
DOCX
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On false-data-injection-attacks-a...
IEEEGLOBALSOFTSTUDENTSPROJECTS
 
DOCX
A lightweight secure scheme for detecting
jpstudcorner
 
PDF
Iaetsd a survey on enroute filtering scheme in
Iaetsd Iaetsd
 
PDF
A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop ...
1crore projects
 
PPTX
Mitchell-TR12-slide.pptx
MahmoudElsisi11
 
PDF
ERCA: Energy-Efficient Routing and Reclustering Algorithm for Cceftoextend Ne...
aciijournal
 
IEEE 2015 NS2 Projects
Vijay Karan
 
IEEE 2015 NS2 Projects
Vijay Karan
 
An Enhanced Detection and Energy-Efficient En-Route Filtering Scheme in Wirel...
ieijjournal
 
AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...
ieijjournal
 
Data security tolerance and portable based energy-efficient framework in sens...
Venu Madhav
 
3 Elsevier Venu Mar 2022.pdf
Venu Madhav
 
A Method of Improving Energy Efficiency Through Geofencing and False Data Blo...
IJCNCJournal
 
Efficient detection of faults and false data injection attacks in smart grid ...
International Journal of Power Electronics and Drive Systems (IJPEDS)
 
A distributed fault intrusion tolerant sensor
IMPULSE_TECHNOLOGY
 
Counter Counter-Measures against Stealth Attacks on State Estimation in Smart...
Sung-Fu Han
 
PREVENTION METHOD OF FALSE REPORT GENERATION IN CLUSTER HEADS FOR DYNAMIC E...
AIRCC Publishing Corporation
 
PREVENTION METHOD OF FALSE REPORT GENERATION IN CLUSTER HEADS FOR DYNAMIC EN-...
ijcsit
 
Prevention Method of False Report Generation in Cluser Heads for Dynamic En-R...
AIRCC Publishing Corporation
 
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On false-data-injection-attacks-...
IEEEGLOBALSOFTSTUDENTPROJECTS
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On false-data-injection-attacks-a...
IEEEGLOBALSOFTSTUDENTSPROJECTS
 
A lightweight secure scheme for detecting
jpstudcorner
 
Iaetsd a survey on enroute filtering scheme in
Iaetsd Iaetsd
 
A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop ...
1crore projects
 
Mitchell-TR12-slide.pptx
MahmoudElsisi11
 
ERCA: Energy-Efficient Routing and Reclustering Algorithm for Cceftoextend Ne...
aciijournal
 
Ad

More from ieeeprojectsbangalore (20)

DOCX
An approach to sensor network throughput enhancement by phy aided mac
ieeeprojectsbangalore
 
DOCX
A time efficient approach for detecting errors in big sensor data on cloud
ieeeprojectsbangalore
 
DOCX
A survey of distributed data aggregation algorithms
ieeeprojectsbangalore
 
DOCX
A cloud based approach to spectrum monitoring
ieeeprojectsbangalore
 
DOCX
Design of a miniaturized wireless blood pressure sensing interface using capa...
ieeeprojectsbangalore
 
DOCX
Design and implementation of dynamic mobile sensor network platform
ieeeprojectsbangalore
 
DOCX
Decentralized eigenvalue algorithms for distributed signal detection in wirel...
ieeeprojectsbangalore
 
DOCX
Debugging the internet of things the case of wireless sensor networks
ieeeprojectsbangalore
 
DOCX
Damaging open phase overvoltage disturbance on a shunt-compensated 500-k v li...
ieeeprojectsbangalore
 
DOCX
Current status of the ieee 1451 standard based sensor applications
ieeeprojectsbangalore
 
DOCX
Cross layer design of distributed sensing-estimation with quality feedback— p...
ieeeprojectsbangalore
 
DOCX
Cross layer design of distributed sensing-estimation with quality feedback— p...
ieeeprojectsbangalore
 
DOCX
Correction to “damaging open phase overvoltage disturbance on a shunt-compens...
ieeeprojectsbangalore
 
DOCX
Cooperative localization in ws ns using gaussian mixture modeling distributed...
ieeeprojectsbangalore
 
DOCX
Convergence of desynchronization primitives in wireless sensor networks a sto...
ieeeprojectsbangalore
 
DOCX
Context aware data processing to enhance quality of measurements in wireless ...
ieeeprojectsbangalore
 
DOCX
Consensus based multiple-model bayesian filtering for distributed tracking
ieeeprojectsbangalore
 
DOCX
Connectivity of cognitive device to-device communications underlying cellular...
ieeeprojectsbangalore
 
DOCX
Concept and model of a metamaterial based passive wireless temperature sensor...
ieeeprojectsbangalore
 
An approach to sensor network throughput enhancement by phy aided mac
ieeeprojectsbangalore
 
A time efficient approach for detecting errors in big sensor data on cloud
ieeeprojectsbangalore
 
A survey of distributed data aggregation algorithms
ieeeprojectsbangalore
 
A cloud based approach to spectrum monitoring
ieeeprojectsbangalore
 
Design of a miniaturized wireless blood pressure sensing interface using capa...
ieeeprojectsbangalore
 
Design and implementation of dynamic mobile sensor network platform
ieeeprojectsbangalore
 
Decentralized eigenvalue algorithms for distributed signal detection in wirel...
ieeeprojectsbangalore
 
Debugging the internet of things the case of wireless sensor networks
ieeeprojectsbangalore
 
Damaging open phase overvoltage disturbance on a shunt-compensated 500-k v li...
ieeeprojectsbangalore
 
Current status of the ieee 1451 standard based sensor applications
ieeeprojectsbangalore
 
Cross layer design of distributed sensing-estimation with quality feedback— p...
ieeeprojectsbangalore
 
Cross layer design of distributed sensing-estimation with quality feedback— p...
ieeeprojectsbangalore
 
Correction to “damaging open phase overvoltage disturbance on a shunt-compens...
ieeeprojectsbangalore
 
Cooperative localization in ws ns using gaussian mixture modeling distributed...
ieeeprojectsbangalore
 
Convergence of desynchronization primitives in wireless sensor networks a sto...
ieeeprojectsbangalore
 
Context aware data processing to enhance quality of measurements in wireless ...
ieeeprojectsbangalore
 
Consensus based multiple-model bayesian filtering for distributed tracking
ieeeprojectsbangalore
 
Connectivity of cognitive device to-device communications underlying cellular...
ieeeprojectsbangalore
 
Concept and model of a metamaterial based passive wireless temperature sensor...
ieeeprojectsbangalore
 

A novel en route filtering scheme against false data injection attacks in cyber-physical networked systems

  • 1. A NovelEn-RouteFiltering Scheme Against False DataInjection Attacks in Cyber-Physical Networked Systems Abstract: In Cyber-Physical Networked Systems (CPNS), the adversary can inject false measurements into the controller through compromised sensor nodes, which not only threaten the security of the system, but also consume network resources. To deal with this issue, a number of en-route filtering schemes have been designed for wireless sensor networks. However, these schemes either lack resilience to the number of compromised nodes or depend on the statically configured routes and node localization, which are not suitable for CPNS. In this paper, we propose a Polynomial-based Compromise-Resilient En-route Filtering scheme (PCREF), which can filter false injected data effectively and achieve a high resilience to the number of compromised nodes without relying on static routes and node localization. PCREF adopts polynomials instead of Message Authentication Codes (MACs) for endorsing measurement reports to achieve resilience to attacks. Each node stores two types of polynomials: authentication polynomial and check polynomial, derived
  • 2. from the primitive polynomial, and used for endorsing and verifying the measurement reports. Through extensive theoretical analysis and experiments, our data shows that PCREF achieves better filtering capacity and resilience to the large number of compromised nodes in comparison to the existing schemes.