False-Data Injection Detector in Networked System

advertisement
DOI 10.4010/2016.763
ISSN 2321 3361 © 2016 IJESC
Research Article
Volume 6 Issue No. 4
False-Data Injection Detector in Networked System
Pazham Nachiappan M R1, Prasanth I2, Rohan David A3, Sathish Saravanan P4
UG Scholar1, 2, 3, Assistant Professor4
Department of Information Technology
Dhanalakshmi College of Engineering, Chennai, India.
nachiappanlm@gmail.com1, www.prasanthilangovan@gmail.com2, ROHANDAVID54@gmail.com3,
psathishsaravanan@gmail.com4
Abstract:
This system is used to detect and filter the sensor’s for validation. The received information contains falsely injected data in a
cyber physical networked system. These system have received a changed attention because of the advances in sensor network
technologies and new development in cyber-physical networked systems (CPNS) .Typical CPNS cover a wide range of
applications including transportation networks, vehicular networks, networks and so on. Unlike more traditional embedded
systems, CPNS is natural and engineered physical systems, which are integrated, monitored and controlled by an intelligent
computational core. In CPNS, sensor nodes obtain the extents from the physical components, process the calculations and send
measured data to the controller through networks.
Keywords: Forward nodes and sensing nodes , CPNS , Cluster Head.
I.
INTRODUCTION
For decades, false data injection detector is being existing;
the reason it is in the existing system while data exchange is
done within the single cluster (i.e.) within a single network.
The main drawback of existing system is, all the process is
carry out only in a single cluster. Controller is available in
cluster to receive all information from other normal data
then its store the information otherwise false information
has been identified and blocked. The main problem in
existing is, all process can be performed by the controller for
this controller resource time has been wasted. On the other
side, In our proposed system, we propose a Polynomialbased Compromise- Resilient En-route Filtering scheme
(PCREF) for CPNS, which can filter false injected data
effectively. PCREF adopts polynomials instead of MACs
(Message Authentication Codes) to verify reports, and can
mitigate node-impersonating attacks against legitimate
nodes. In our scheme, two types of nodes are
considered, they are sensing node and forwarding node.
These two types of nodes are denoted as sensor nodes. Each
node stores check polynomial, which are derived by
different primitive polynomials. When a report is transmitted
from a sensor node to the controller, each forwarding node
checks whether the forwarding reports actually carry valid
data. If not, the report is considered as a false one forged by
the adversary and then dropped. Otherwise, the report is
forwarded to the next forwarding nodes along the route. This
process ensures that false reports can be filtered along the
route as quickly as possible before arriving at the controller.
II.
EXPERIMENTAL STUDY
The design is based on IEEE Transactions on
Computers, which focus on creation of network secured
International Journal of Engineering Science and Computing, April 2016
system using JDK. False data injection detector is an
application that is designed to be used by the network
communicators to filter the false data using sensor
technologies.
The user transferring data through the false data injection
technique should be authenticated as the first step. This
authentication is done by providing a user name and
password to enter into the system for transferring the
data packets.
Figure.1.Architecture of False Data Injection Detector
In the past, a number of schemes have been designed to
filter the false injected data in sensor networks. However,
those schemes have their limitations and cannot be used
to effectively deal with attacks related to CPNS. For
example, SEF and IHA have the -threshold limitation, that
is, if the adversary compromises nodes from different
3293
http://ijesc.org/
groups, they can launch the node impersonating attack on
legitimate nodes. LBRS, LEDS and CCEF are vulnerable to
node failure and denial-of-service (DoS) attacks. Those
attacks may cause the controller not to receive measurement
on time and make the system operation unstable. DEFS and
GRSEF
achieve low resilience to the number of
compromised nodes and DEFS introduces lots of extra
control messages and incurs the consumption of energy
resources on nodes.
Before the sensor nodes are deployed, we need to prepare a
master key and a global primitive polynomial pool. The
master key can be generated and stored in the memory of
nodes before nodes are deployed and used to produce the
cluster key for each cluster. The global primitive polynomial
pool consists of several ternary polynomials, which are
randomly created before nodes are deployed. The global
primitive polynomial pool is used to assign the primitive
polynomial to each cluster and its size is < , where
is the number of sensing nodes monitoring a component, is
the total sensing nodes in the system. Finally, there is a hash
function in our scheme, and its domain and range are the set
of encrypted measurements of components reported by
sensing nodes and the set of positive integers, respectively.
III.
EXPERIMENTAL RESULTS
After logging in, the Admin creates ‘n’ number of cluster
and also creates nodes in the clusters.
International Journal of Engineering Science and Computing, April 2016
The Admin then finds out the neighbouring nodes. To find
the neighbouring nodes the Admin uses parameters such as
Distance, Range, Memory and battery of the system under
consideration. Neighbouring nodes are identified to send
data between them. Forward sensor acts as the
intermediary that facilitates data sending between
clusters. Forward sensor is also a node but it is not a group
of nodes but a single node that acts as the intermediary.
Controller also known as cluster aka Leader node head is
also selected using the previously stated parameters.
Controller is the head of a cluster, the remaining nodes send
data to the controller, and controller forwards the data to the
forward sensor, which in turn sends data to the other nodes.
Keys are provided after the clusters are created. A single
symmetric key is given to a cluster which is common to all
the nodes in the cluster. The nodes send data to the cluster
which sends it to the forward sensor. Before sending the
data, the cluster heads encrypts the data using a public
key. DES (Data Encryption Standard) is used for encryption.
After being encrypted, a signature will be generated. The
data along with the signature is sent to the forward sensor.
Data injection will only take place in the forward sensor. The
forward sensor will forward the data to the second cluster.
The second cluster will decrypt the data using the same
public key. If the signatures mismatch, then false data has
been injected. The whole process will be stopped if data has
been injected. If the signatures match then, false data has
not been injected.
3294
http://ijesc.org/
Figure.2.Data Flow Of False Data Injection Detector
As the data flow shows, the key is sent by the cluster head
to the sensor with the data. The key is verified by the second
cluster by decrypting it with the public key. If the signatures
match then no false data has been injected, else false data
has been injected.
International Journal of Engineering Science and Computing, April 2016
IV.
CONCLUSION
False data injection has been a major threat when it comes to
secure data transmission. The retransmission of data due to
false injection is a tedious system. Using encryption and
3294
http://ijesc.org/
decryption, the data can be verified as to whether it is false
or true data.
V.
FUTURE ENHANCEMENTS
We developed a cluster based primitive polynomial
assignment to limit the effect of compromised nodes to small
area via both theoretical analysis and simulation
experiments. Our data show that the developed scheme
achieves better filtering capacity and resilience to a large
number of compromised nodes in comparison with the
existing schemes.
VI.
REFERENCES
[1]
(2010). CPS Week
http://www.cpsweek2010.se/
[Online].
Available:
[2] F. Wu, Y. Kao, and Y. Tseng, “From wireless sensor
networks towards cyber physical systems,” Pervasive
Mobile Comput., vol. 7, no. 4, pp. 397–413, Aug. 2011. [3]
A. A. Cardenas, S. Amin, and S. Sastry, “Secure control:
Towards survivable cyber-physical systems,” in Proc. 1st
Int. Workshop Cyber-Phys. Syst. (WCPS), 2008, pp. 495–
500.
[4] M. Pajic, A. Chernoguzov, and R. Mangharam, “Robust
Architectures for embedded wireless network control and
actuations,” Trans. Embedded Comput. Syst., vol. 11, no. 4.
article no. 82, Dec. 2012.
[5]
Cyber Physical Networks(CPN) Research Lab.
[Online]. Available:http://cpn.berkeley.edu/.
[6] A. Albur and A. G. Exposito, Power System State
Estimation:Theory and Implementation. Boca Raton, FL:
CRC Press, Mar.2004.
[7] H. Chan and A. Perrig, “Security and privacy in sensor
networks,”Computer, vol. 36, no. 10, pp. 103–105, 2003.
[8] Y. Younan, P. Philippaerts, F. Piessens,W. Joosen, S.
Lachmund, and T. Walter, “Filter-resistant code injection
on arm,” in Proc. 16thACM Conf. Comput. Commun.
Security(CCS), 2009, pp. 11–20.
[12] Y. Mo and B. Sinopoli, “False data injection attacks
in Control systems,” in Proc. Preprints 1st Workshop Secure
Control Syst., CPS Week, 2010.
[13] F. Ye, H. Luo, S. Lu, and L. Zhang, “Statistical enroute filtering of injection false data in sensor networks,”
IEEE J.Sel. Areas Commun., vol. 23, no. 4, pp. 839–850,
Apr.
2005.
[14] H. Yang, F. Ye, Y. Yuan, S. Lu, and W. Arbaugh,
“Toward resilient security in wireless sensor networks,” in
Proc. 6th ACM Int. Symp. Mobile Ad Hoc Netw. Comput.
(MobiHoc’05), 2005, pp. 34–45.
[15] L. Yu and J. Li, “Grouping-based resilient statistical
en- route filtering for sensor networks,” in Proc. 28th IEEE
Int. Conf. Comput. Commun. (INFOCOM), 2009, pp.
1782–1790.
[16] K. Ren, W. Lou, and Y. Zhang, “Leds: Providing
location-aware endto- end data security in wireless sensor
networks,” IEEE Trans. Mobile Comput., vol. 7, no. 5, pp.
585–598, May 2008.
[17] S. Zhu, S. Setia, S. Jajodia, and P. Ning, “An
interleaved hop-by-hop authentication scheme for filtering of
injection false data in sensor networks,” ACM Trans.
Sensor Netw., vol. 3, no. 4, pp. 259–271, 2007.
[18] H. Yang and S. Lu, “Commutative cipher based enroute filtering in wireless sensor networks,” in Proc. 60th
IEEE Veh. Technol. Conf. (VTC), 2004, pp. 12–23.
[19] Z. Yu and Y. Guan, “A dynamic en-route filtering
scheme for data reporting in wireless sensor networks,”
IEEE/ACM Trans. Networking (ToN), vol. 18, pp. 150–163.
2010.
[20] Y.-S. Chen and C.-L. Lei, “Filtering false messages enroute in wireless multi-hop networks,” in Proc. IEEE
Wireless Commun. Netw. Conf. (WCNC), 2010, pp. 1–6.
[9] K. Xing and X. Cheng, “From time domain to space
domain:Detecting replica attacks in mobile ad hoc
networks,” in Proc.29th Conf. Inf. Commun. (INFOCOM),
2010, pp. 1595–1603.
[10] Q. Yang, J. Yang, W. Yu, N. Zhang, and W. Zhao, “On
a hierarchical false data injection attack on power system
state estimation,”in Proc. IEEE Global Telecommun.
Conf.(GLOBECOM’11), 2011
[11] Y. Liu, M. K. Reiter, and P. Ning, “False data injection
attacks against state estimation in electric power grids,” in
Proc. 16th ACM Conf. Comput. Commun. Security (CCS),
2009, pp. 21–32.
International Journal of Engineering Science and Computing, April 2016
3294
http://ijesc.org/
Download