BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks – projects 2012
projects 2012, Parallel And Distributed Systems, Vol. 23, No. 1, January 2012
Injecting false data attack is a well known serious threat to wireless sensor network, for which an adversary reports bogus information to sink causing error decision at upper level and energy waste in en-route nodes. In this paper, we propose a novel bandwidth-efficient cooperative authentication (BECAN) scheme for filtering injected false data. Based on the random graph characteristics of sensor node deployment and the cooperative bit-compressed authentication technique, the proposed BECAN scheme can save energy by early detecting and filtering the majority of injected false data with minor extra overheads at the en-route nodes. In addition, only a very small fraction of injected false data needs to be checked by the sink, which thus largely reduces the burden of the sink. Both theoretical and simulation results are given to demonstrate the effectiveness of the proposed scheme in terms of high filtering probability and energy saving.
In this application, we try to implement wireless network, which is bandwidth efficient authentication scheme for filtering injected false data. We develop this network in Java Swing for which JDK 1.6 or higher version can be used. Socket connection will be established between the base station, forwarding node and sensor nodes. Number of sensor node in the network can be any as of our interest. Base station is created with CIR (Certain Interest Region) and in a cluster. Forwarding node also created with CIR value and cluster is mentioned. Similarly, sensor nodes also created by naming cluster (e.g. cluster1 or cluster2).
In sensor node, we design a movable value, which is considered to be the mobility. The percentage of sensor node, which is showing high value acts as a Cluster Head. When the sensor node is activated it acquires key value for key.propoerties file. Similarly the data is read from sensor.properties file. The attacker is identified in the earlier stages, thus we define our model as bandwidth efficient.