By Topic

Integration of Secure In-Network Aggregation and System Monitoring for Wireless Sensor Networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
B. Sun ; Lamar Univ., Beaumont ; X. Jin ; K. Wu ; Y. Xiao

Secure in-network aggregation in wireless sensor networks (WSNs) is a necessary and challenging task. In this paper, we address this research problem from an intrusion detection perspective. We propose that system monitoring modules, which provide one of the most important functionalities for WSNs, should be integrated with intrusion detection modules. Under this architecture, we first propose an extended Kalman filter (EKF) based mechanism to detect false injected data. Specifically, by monitoring behaviors of nodes' neighbors and using EKF to predict their future state (the real in-network aggregated value), we aim at setting up the normal range of neighbors' future transmitted aggregated values. We illustrate how we use EKF to create effective local detection mechanisms. Using different aggregation functions (average, sum, max, and min), we analyze how to obtain the threshold in theory. We then illustrate how our proposed local detection approach can work together with the system monitoring module to differentiate between malicious events and emergency events. We conduct simulations to evaluate performance of local detection mechanisms, including false positive rate and detection rate, under different aggregation functions.

Published in:

2007 IEEE International Conference on Communications

Date of Conference:

24-28 June 2007