Vol. 1, No. 1 | Jan – June 2017 SJCMS | P-ISSN: 2520-0755 | Vol. 1 | No. 1 | © 2017 Sukkur IBA 51 Enhancing the Statistical Filtering Scheme to Detect False Negative Attacks in Sensor Networks Muhammad Akram, Muhammad Ashraf, College of Information and Communication Engineering, Sungkyunkwan University, Suwon 16419, Republic of Korea akram.khan@skku.edu, ashraf84@skku.edu Tae Ho Cho College of Software, Sungkyunkwan University, Suwon 16419, Republic of Korea thcho@skku.edu Abstract In this paper, we present a technique that detects both false positive and false negative attacks in statistical filtering-based wireless sensor networks. In statistical filtering scheme, legitimate reports are repeatedly verified en route before they reach the base station, which causes heavy energy consumption. While the original statistical filtering scheme detects only false reports, our proposed method promises to detect both attacks. Keywords: WSNs; SEF; en route filtering; false positive attack; false negative attack; energy efficiency. 1. Introduction Wireless Sensor Networks (WSNs) comprise tiny nodes equipped with restricted computational resources and limited energy supply. WSNs are usually deployed in an exposed environment which increases their proneness to security compromises such as cryptographic information capture [1]. Compromised nodes are exploited by attackers to initiate numerous attacks, such as denial of service, sinkhole attack, and eavesdropping [2]. Usually, attackers use compromised nodes to create bogus event reports, and inject them into the network to drain the energy of the network [1, 2]. Various filtering schemes have been proposed to detect and filter these bogus reports en route [1-5]. Compromised sensor nodes can also be exploited to block authentic data from being delivered to the base station (BS), by attaching false Message authentication codes (MACs) to legitimate reports [1, 2, 6]. These true reports with false MACs attached to them are dropped en route at the intermediate verification nodes. PVFS counters these two attacks simultaneously, whereas other filtering schemes only focus on countering the false report injection [FRI] attack, which is also known as the false positive attack [1-8]. All of these filtering schemes use either static or dynamic authentication key sharing [1-5, 7, 8]. We propose to enhance the filtering capacity of the SEF scheme so that it not only filters false reports, but also allows legitimate reports with false MACs to reach the BS station without failure. The probabilistic mailto:akram.khan@skku.edu mailto:ashraf84@skku.edu mailto:thcho@skku.edu M. Akram et al. Enhancing the Statistical Filtering Scheme to Detect False Negative Attacks in Sensor Networks (pp. 51 - 56) SJCMS | P-ISSN: 2520-0755 | Vol. 1 | No. 1 | © 2017 Sukkur IBA 52 voting-based filtering scheme (PVFS) [2] is a static scheme that deals with both the attacks, and filters false reports at the probabilistically chosen verification nodes. In statistical en route filtering (SEF), each intermediate node verifies the report probabilistically, and if it detects an invalid MAC attached to it, it immediately drops it. SEF exploits network scale and density to drop false data through the collective detection power of several intermediate relay nodes. However, while making a decision to drop the report, SEF does not allow the forwarding nodes to consider the results of the previous verifications. Every intermediate node that finds an invalid MAC makes an independent decision to drop the report. This inflexibility of SEF allows room for the compromised nodes to impact the performance of the network. Compromised nodes launch a false negative attack by attaching false MACs to the legitimate reports that are dropped en route by the verification nodes. The false negative attack stalls the passage of true reports to the BS [1, 2, 6]. By appending a few extra bits in the header of the report being forwarded, we can make SEF restrict false negative attacks. Once a threshold for the verification of true reports is reached, they are marked safe, and forwarded without further verification. The FRI attack aims to drain the energy resource of the sensor network, and render it useless in the presence of compromised nodes. The detection probability in SEF increases with distance. However, relying on the filtering capability of filtering nodes farther from the report generating cluster and closer to the BS leads to an uneven load share. An energy-hole syndrome appears in which the filtering nodes around the BS soon die out on account of their rapid depletion of energy and unceasing verification activity. The energy-hole phenomenon causes information lose and shortened network lifetime. In SEF, each forwarded report is verified against T MACs created by keys from T distinct non-overlapping sub-pools of authentication keys. Firstly, each intermediate node checks if a report carries T MACs, as well as T key indices from T different partitions. Secondly, the intermediate node tries to check if a key’s index in the report matches that of one of its own keys. If so, the intermediate node tries to authenticate the report by calculating a new MAC with the same key. If the new calculated MAC matches the MAC contained in the report, the report is authenticated, and forwarded. If the MAC is found to be false, the report is immediately dropped. If none of the key indices in the report matches a key index of the keys possessed by the node itself, an intermediate node simply forwards the report. Thus if it possesses the matching key, every intermediate node is virtually required to authenticate the report. None of the intermediate nodes considers the outcome of the previous verifications performed by the earlier nodes in the decision making. If a single MAC is found to be false, any intermediate node immediately drops the report. This is why the SEF schemes do not handle the false negative attack, as well as it incurs more energy by requiring every intermediate node to verify the report. 2. Statistical En route Filtering (SEF) SEF is the first scheme that was proposed to filter false data injected by adversaries exploiting compromised nodes. In SEF, a pre-generated global key pool of size N, maintained at the BS, is divided into multiple non-overlapping n partitions, each of size m, i.e. N = m x n Figure 1 shows the partitions of the global key pool and allocation of k keys to each sensor node in the network. Every key is mapped against a unique key index for identification purpose during the process of en route filtering. Prior to sensor deployment, M. Akram et al. Enhancing the Statistical Filtering Scheme to Detect False Negative Attacks in Sensor Networks (pp. 51 - 56) SJCMS | P-ISSN: 2520-0755 | Vol. 1 | No. 1 | © 2017 Sukkur IBA 53 each node is preloaded with k (k