False Data Filtering Mechanism Based on Cloud-Built Authentication Model in Wireless Sensor Networks
DOI:
Author:
Affiliation:

Clc Number:

Fund Project:

  • Article
  • |
  • Figures
  • |
  • Metrics
  • |
  • Reference
  • |
  • Related
  • |
  • Cited by
  • |
  • Materials
  • |
  • Comments
    Abstract:

    Most of recent false data filtering mechanisms in WSN added t-MAC (Message Authentication Code) for the data packets, these mechanisms are usually restricted within the t-threshold safe limits, and do not support dynamic routing. Based on the idea of a virtual witnesses cluster, adopting the perturbation-based polynomial technology, this paper proposes a authentication algorithm that made a number of nodes within a cloud cooperate to generate the certification polynomial, adopting the perturbation-based polynomial technology and increasing the difficulty of an attack. On this basis, the proposed false data filtering mechanism can verify the validity of data immediately, and support dynamic routing. Theoretical analysis and simulation experiments show that the new method is not limited by the t-threshold and save as more energy as the transmission jump increasing. Compared with the other mechanisms, the method enhances the anti-trapping ability. It is more suitable for the network with low credibility and the long-distance transmission application.

    Reference
    Related
    Cited by
Get Citation

彭 舸,林亚平,易叶青.无线传感器网络基于云团认证的虚假数据过滤机制.软件学报,2009,20(zk):239-249

Copy
Share
Article Metrics
  • Abstract:
  • PDF:
  • HTML:
  • Cited by:
History
  • Received:May 01,2009
  • Revised:July 23,2009
  • Adopted:
  • Online:
  • Published:
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063