Next Article in Journal
Hybrid EEG—Eye Tracker: Automatic Identification and Removal of Eye Movement and Blink Artifacts from Electroencephalographic Signal
Next Article in Special Issue
Social Milieu Oriented Routing: A New Dimension to Enhance Network Security in WSNs
Previous Article in Journal
Inspection Robot Based Mobile Sensing and Power Line Tracking for Smart Grid
Previous Article in Special Issue
Secure and Privacy-Preserving Body Sensor Data Collection and Query Scheme
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Secure Scheme for Distributed Consensus Estimation against Data Falsification in Heterogeneous Wireless Sensor Networks

1
Luoyang Electronic Equipment Test Center (LEETC), Luoyang 471003, China
2
Department of Automation, Shanghai Jiao Tong University, and Key Laboratory of System Control and Information Processing, Ministry of Education of China, Shanghai 200240, China
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
Sensors 2016, 16(2), 252; https://doi.org/10.3390/s16020252
Submission received: 30 November 2015 / Revised: 22 January 2016 / Accepted: 12 February 2016 / Published: 19 February 2016
(This article belongs to the Special Issue Security and Privacy in Sensor Networks)

Abstract

:
Heterogeneous wireless sensor networks (HWSNs) can achieve more tasks and prolong the network lifetime. However, they are vulnerable to attacks from the environment or malicious nodes. This paper is concerned with the issues of a consensus secure scheme in HWSNs consisting of two types of sensor nodes. Sensor nodes (SNs) have more computation power, while relay nodes (RNs) with low power can only transmit information for sensor nodes. To address the security issues of distributed estimation in HWSNs, we apply the heterogeneity of responsibilities between the two types of sensors and then propose a parameter adjusted-based consensus scheme (PACS) to mitigate the effect of the malicious node. Finally, the convergence property is proven to be guaranteed, and the simulation results validate the effectiveness and efficiency of PACS.

1. Introduction

With the features of being low cost, easy to deploy and the self-organization of sensor nodes, wireless sensor networks (WSNs) are widely used to estimate the physical parameters in hazardous and remote areas, such as military defense, intelligent transportation, industrial production, environment monitoring, smart homes, and so on [1,2,3,4,5]. In most applications, the environment may be complicated and needs different kinds of sensors. Therefore, it is wiser to use a combination of different sensors: numbers of cheap, low-end sensors and some expensive, high-quality sensors, making up the heterogeneous wireless sensor networks (HWSNs) [6,7,8,9].
In WSNs, it is often necessary for some or all of the nodes to calculate some functions with certain parameters. Additionally, distributed estimation is an effective tool to exchange information among sensor nodes in the network. It is a well-studied domain and has attracted much attention [10,11,12,13,14,15,16]. However, in most applications, the networks are deployed in a harsh environment or a hostile region. Due to the restrictions of the computation abilities, storage capacity and battery power of sensor nodes, they are unable to be loaded with firewall-like security tools [17]. There inevitably exists a security problem in distributed networks. For example, if a sensor is intruded in an HWSN, other kinds of sensors are affected, and this may cause network congestion, network lifetime reduction, sensing inaccuracy, etc. [18,19,20]. Therefore, the study of the security of distributed estimation in HWSNs is very important for addressing the issue of the growing malicious attack threat.
As we know, distributed estimation in the presence of malicious nodes has attracted considerable attention in homogeneous wireless sensor networks [21,22,23]. Generally, fault monitoring algorithms are based on a detection threshold or state estimate residuals to distinguish attackers from honest nodes. In an HWSN, with different types of sensors, data are integrated in different ways. Therefore, the detection algorithms in homogeneous wireless sensor networks are not suitable for HWSNs. Nevertheless, some security schemes have been proposed for HWSNs. Incorporating pairwise keys used for sensor nodes communicating with each other has been studied in [24]. Key management schemes for providing security operations in the HWSN have been considered [25]. Some researchers were concerned with mutual authentication frameworks [26]. These secure schemes based on authentication and key management cost much energy and storage capacity, while sensor nodes have the restrictions of computation abilities, storage capacity and battery power. The schemes were not practical for low-cost sensors. Some secure schemes based on a distributed consensus estimation algorithm have also been proposed for wireless sensor networks. A weighted averaging-based consensus scheme (WACS) [27] was proposed to mitigate the negative impact of malicious nodes for homogeneous wireless sensor networks. The scheme was based on weighted average parameters, which were prescribed as fixed values within a certain range, and the parameters affected the convergence speed or there was the effect of the weighted averaging-based consensus scheme (WACS). The results with the WACS finally converged to the average of the initial values of all sensor nodes. If the initial values were forged by attackers, the scheme could do nothing to protect the network from attackers injecting false data into the sensing stage. Considering the restrictions of the computation abilities, storage capacity, the battery power of sensor nodes and the security of the network, this paper focuses on security issues in HWSNs.
In this paper, we consider distributed estimation in the HWSNs consisting of two types of sensors: sensor nodes (SNs) and relay nodes (RNs). SNs have a good hardware architecture and are high quality, and they can sense the surrounding parameters and are responsible for data fusion. RNs are inexpensive and low end, and their main role is to relay the information for SNs. In the case the network is attacked by malicious nodes, we present a data falsification attack, that is malicious nodes manipulate false data in the network and damage the consensus of the whole system. Then, we propose a parameter adjusted-based consensus scheme (PACS) to decrease the negative effect of the data falsification attack. The main difference from the existing algorithm is that we explicitly consider the heterogeneity of responsibilities between the two types of sensors. With the network topology, we demonstrate the transformation of the distributed consensus method to overcome the challenges produced by the heterogeneity. Additionally, by adjusting the weights of sensor nodes, we illustrate how the PACS can decrease the effect of malicious nodes and avoid excluding the honest nodes with large deviations to participate in the distributed consensus. We evaluate the effectiveness and efficiency of the PACS.
The reminder of the paper is outlined as follows. The network model and the attack model are introduced in Section 2. In Section 3, we propose the secure scheme. Section 4 provides some simulations. The conclusion and future work are presented in Section 5.

2. System Model

2.1. Network Model

For the large-scale network, the long distance transmission costs much energy and may result in separate groups of sensors. A popular method is to deploy relay sensors for connecting the separate groups. Thus, the whole network can be connected. Here, we consider a connected HWSN with a combination of different sensors: sensor nodes (SNs) and relay nodes (RNs). The network contains N nodes, which consists of M numbers of SNs and ( N - M ) numbers of RNs. I S = { 1 , 2 , . . . , M } represents the set of SNs, and I R = { M + 1 , M + 2 , . . . , N } represents the set of RNs. Each SN can perceive the surrounding parameters, while RNs cannot sense the parameters, but can relay information for the network. We use an undirected graph G = ( V , E ) to describe the network. V denotes the set of nodes, and V = I S I R , where I S represents the set of SNs and I R represents the set of RNs; E V × V denotes the set of edges referring to the communication links. If there exists an edge connecting two nodes, the two nodes can communicate with each other. If ( i , j ) E where i j (i.e., node j can transfer information with node i), we call node j a neighbor of node i. N i = { j | ( j , i ) E } V represents the neighbor set of node i. The number of elements in N i is denoted by | N i | .
Define the Laplacian matrix of G as L = ( l i j ) N × N , then:
l i j = - 1 , if j i , j N i | N i | , if j = i 0 , otherwise
Each node i I S is supposed to begin with a private value x i ( 0 ) by sensing the environment. The aim for the network is to converge to a common value relying on x i ( 0 ) by the incorporation of each node. During the distributed consensus estimation, at each iteration step k, each sensor node updates and exchanges its values with neighbors according to a prescribed strategy, which can be modeled by a discrete-time equation, and each node i updates its estimation as follows:
x i ( k + 1 ) = x i ( k ) + ϵ j N i a i j ( x j ( k ) - x i ( k ) ) , if i I S
and:
x i ( k + 1 ) = j N i γ i j x j ( k ) , if i I R
where:
0 < ϵ < ( max i | N i | ) - 1 = 1 Δ
x i ( k ) represents the state value of node i at time step k. Δ represents the maximum degree of the network, and a i j denotes the amplitude of the signal received by sensor i from sensor j. γ i j is the corresponding weight satisfying γ i j > 0 , and j N i γ i j = 1 , i I R . We set the notation γ i j = 0 , for j N i . For all j N i , we have that j = 1 N γ i j = 1 , i I R . It is clear that each node updates its estimates by the linear combination of its neighbors’ state values and its own values.
To simplify the consensus scheme, we combine Equations (2) and (3) and get the consensus equation that only contains the SNs, but implies the state of RNs.
x i ( k + 1 ) = x i ( k ) + ϵ j N i S a i j ( x j ( k ) - x i ( k ) ) + k N i R j N k S a i k γ k j ( x j ( k ) - x i ( k ) )
N i S represents the sensor neighbor set of node i, while N i R represents the relay neighbor set of node i.

2.2. Attack Model

A familiar attack called data falsification is considered in this paper. A false state value may be manipulated in the sensing stage or in the state updating progress by a data falsification attacker. We can see that the data falsification attack is easy to implement if a sensor node has been captured. Moreover, due to noise in the environment, there is usually a large error when a sensor node perceives parameters. Therefore, it is hard to distinguish whether a sensor node is captured by data falsification or not. Since this kind of attack can effect the consensus process and cause long-term impacts, it can be destructive to the network. Three types of data falsification will be presented in the following [28].
Perception Data Falsification (PDF) Attack: This attack changes the value of x i ( 0 ) , i I S . An attacker aims to forge a false sensing data and to disseminate it to its neighbors. However, in the information fusing phase, malicious nodes correctly update their estimates and send the estimated value to their neighbors. This kind of attack is easy to implement, but difficult to distinguish from honest nodes with a large deviation. To avoid mistaking honest nodes with a large deviation, the objective of our scheme in this paper is to decrease, but not to eliminate the attackers.
Iteration Data Falsification (IDF) Attack: False data are injected both in the sensing stage and at each iteration step by attackers. This type of attack can impact the consensus process; therefore, it can compromise the network for a long time.
Random Data Falsification (RDF) Attack: The attacker injects forged data or correctly executes a distributed estimation process in a random way. This type of attack is difficult to be detected because of its concealed feature.
In this paper, a distributed secure scheme based on parameter adjustment is presented to decrease the effect of the data falsification attack. We adjust the parameters in the distributed consensus algorithm (Equation (5) in Section 2.1). Abnormal nodes are distinguished from honest nodes via an adaptive local threshold. If a node is considered to be abnormal, the weight is reduced. In this way, we propose the PACS to decrease the effect of malicious nodes and to ensure the security of the network.

3. Secure Scheme

In this section, we propose a PACS for protecting the network from the data falsification attack. Then, its effectiveness is demonstrated by analyzing the algorithm.

3.1. Parameter Adjusted-Based Consensus Scheme

Detection algorithms are designed to assort abnormal nodes and honest nodes in the network. With the characteristics of the consensus algorithm, the state values of all of the nodes in the network converge to a common value, and the difference among all of the states is reduced to zero. Based on this characteristic, this paper presents a detection algorithm by comparing a localized threshold to the difference produced by each node state and its neighbors’, and the threshold adaptively shrinks to zero.
We now elaborate the consensus secure scheme based on the detection algorithm below. In the first stage, the node i I S makes a measurement independently and transfers the measurement value to its neighbors. Then, node i compares the state value to its neighbor’s value. The set of nodes satisfying | x j ( k ) - x i ( k ) | < λ i ( k ) is denoted as N i T , and the set of nodes satisfying | x j ( k ) - x i ( k ) | λ i ( k ) is denoted as N i F . α i ( k ) and β i ( k ) represent the number of N i F and N i T , respectively. If β i ( k ) + 1 α i ( k ) , the measurement of the node i I S is correct, and its state update equation is demonstrated as follows.
x i ( k + 1 ) = x i ( k ) + σ ( k ) j N i S T a i j ( x j ( k ) - x i ( k ) ) + j N i S F a i j a ( k ) ( x j ( k ) - x i ( k ) ) + k N i R j N k S T a i k γ k j ( x j ( k ) - x i ( k ) ) + k N i R j N k S F a i k a ( k ) γ k j ( x j ( k ) - x i ( k ) )
σ ( k ) > 0 represents the weight. N i S T denotes the set of sensor nodes in N i T , and N i S F denotes the set of sensor nodes in N i F . a ( k ) is a parameter that can affect the consistency coefficient. From the equation, we can see that if a ( k ) becomes larger, the effect of the corresponding node becomes smaller. If a node is detected to be abnormal at the iteration step k, the corresponding coefficient a ( k ) becomes larger, and finally, its influence can be reduced. Additionally, a ( k + 1 ) = a × a ( k ) , where a is an integer whose value is larger than one. If a node stops injecting false data at the iteration step, the corresponding coefficient a ( k ) decreases. If a ( k ) > 1 , a ( k + 1 ) = ( 1 / a ) × a ( k ) at the iteration step until a ( k ) = 1 . If a ( k ) = 1 and the node performs normally, a ( k ) stays at one.
We define P ( k ) = I - σ ( k ) L . Then, we can get the compact form of Equation (6):
x ( k + 1 ) = P ( k ) x ( k )
Meanwhile, if the nodes satisfy β i ( k ) + 1 < α i ( k ) , the nodes are considered to be incorrect, and their update equation remain as Equation (5).
To determine the threshold λ i ( k ) of each node n i , we give the equation as follows.
λ i ( k ) = 1 | N i | j N i x j ( k ) - x i ( k ) + j N i x j ( k ) N i + 1
Considering that malicious nodes inject false data with a large deviation from the sensing data of authentic nodes, we can detect the attacker by comparing the threshold with the difference between the neighbors’ states and the state of node i. Furthermore, as the consensus is carried out, the localized threshold λ i ( k ) will decease to zero, and the attackers are given no tolerance.
The whole procedure of PACS is concluded in the following Algorithm 1.
Algorithm 1: Parameter Adjusted-Based Consensus Scheme (PACS).
Require: Graph G = ( V , E ) , M SNs, N - M RNs
Ensure: x ( k )
1:set k = 0
2:for i I S do
3: set a ( k ) = 1 , a > 1 , α i = 0 and β i = 0
4:i makes the measurement and gets the initial x i ( 0 ) , then transmits x i ( 0 ) to its neighbors.
5:end for
6:for the consensus is not reached do
7:for i I S do
8:   λ i ( k ) = 1 | N i | j N i x j ( k ) - x i ( k ) + j N i x j ( k ) N i + 1
9:  for j N i do
10:   if | x i ( k ) - x j ( k ) | > λ i ( k ) then
11:     α i = α i + 1
12:    if a ( k ) = 1 then
13:      a ( k ) = a
14:    else
15:      a ( k ) = a × a ( k )
16:    end if
17:   else
18:     β i = β i + 1
19:    if a ( k ) > 1 then
20:      a ( k ) = 1 a a ( k )
21:    else
22:      a ( k ) = 1
23:    end if
24:   end if
25:  end for
26:  if β i + 1 > α i then
27:    x i ( k ) updates its state according to Equation (6) and transmits the state estimation to its neighbors.
28:   Update L ^ i i and ensure the sum of i-th row sum is 1.
29:  end if
30:end for
31: set k = k + 1
32:end for

3.2. Performance Analysis

In this section, we analyze the performance of the proposed PACS. We consider that node v 1 is an abnormal node injecting false data in the sensing stage. The neighbors of v 1 are denoted by v 2 , v 3 , . . . , v | N 1 | + 1 . Then, at the iteration step k, we can get the Laplacian matrix L ( k ) as follows:
l i j = - a i j a k , if j 1 , i N 1 S - a i j a k γ k j , if j 1 , i N 1 R l i j - a i j + a i j a k , if j = i 1 , j N 1 S l i j - a i j γ i j + a i j a k γ i j , if j = i 1 , j N 1 R l i j , otherwise
According to the proposed algorithm, if the state value is considered abnormal at each iteration k, the corresponding parameter of x 1 ( k ) decreases. Additionally, P ( k ) is also changed. We suppose that the HWSN is not dominated by attackers.
Firstly, we illustrate that the network can reach convergence. Note that there are n eigenvalues of L ( k ) at the first place. According to the Gershgorin circle theorem [29] and γ i j < 1 , we get the following inequations:
| ξ m - | N j | + 1 - a i j a k γ i j | | N j | - 1 + a i j a k γ i j , j N 1 R
| ξ m - | N j | + 1 - a i j a k | | N j | - 1 + a i j a k , j N 1 S
| ξ m - | N j | | | N j | , j N 1
where ξ m ( 1 m n ) is an eigenvalue of L ( k ) at the first place. Because of 0 < σ ( k ) < ( max i N i ) - 1 , we can get that 0 ξ m 2 ( max i N i ) - 1 . The eigenvalue of P ( k ) is ξ m * = 1 - σ ( k ) ξ m , so we can obtain that - 1 < ξ m * < 1 . Moreover, the network is connected, and r a n k ( G ) = n - 1 [4]. Thus, L has only a single zero eigenvalue, and P ( k ) has only one single eigenvalue, which is 1 . The network can reach convergence.
With the consensus-based estimation, x 1 ( k ) finally converges to a normal range, and P ( k ) keeps a common value P 0 when k is large enough. We assume P ( k ) keeps a common value P 0 for k = k 0 . Thus, we can get the result of the consensus.
x ( k ) = lim k P 0 k k = 1 k 0 - 1 P ( k ) x ( 0 )
Secondly, we prove the efficiency of the scheme by computing lim k P 0 k k = 1 k 0 - 1 P ( k ) . A lemma is introduced as follows.
Lemma 1. 
[13] Given a primitive nonnegative matrix P 0 , if there exist eigenvectors u and w T satisfying P 0 u = u and w T P 0 = w T , then lim k P 0 k = u w T w T u holds.
If the graph G is a strongly connected component, we can get that P 0 is a primitive nonnegative matrix [13]. The eigenvectors u = 1 and w T = [ 1 , a k , . . . a k ] satisfy the conditions in Lemma 1. Thus, we can obtain the following equation:
lim k P 0 k = u w T 1 + a k ( N - 1 )
According to the result of lim k P 0 k , we can compute x ( k ) . For the convenience of discussion, a two-hop network is considered. A theorem is presented as below. Additionally, a row vector z i T is defined as follows:
z i T = z 1 , if i = 1 z 2 , if 1 < i 1 + | N 1 | z 3 , if 1 + | N 1 | < i N
where z 3 z 2 a k z 1 . If a network has more hops, we can extend z T = [ z 1 , z 2 , . . . , z 2 , z 3 , . . . , z 3 , . . . , z n , . . . , z N ] satisfying z N . . . z 3 z 2 a k z 1 , and a similar conclusion can be made. Define that N i G = { j | j 1 and j N i / N 1 , 1 < i | N 1 | + 1 } and N i H = { j | j N i N 1 , | N 1 | + 1 < i N } . The numbers of the above set are denoted as | N i G | and | N i H | , respectively. The element number of the two-hop node set in the neighboring set of one-hop nodes is constant. Meanwhile, the element number of the one-hop node set in the neighboring set of two-hop nodes is constant, too. Thus, we get | N 2 G | = | N i G | ; | N 3 H | = | N i H | is invariable. Additionally, the following theorem is drawn.
Theorem 1. 
Given a row vector z T satisfying z 3 z 2 a k z 1 and ψ T = z T P ( k ) satisfying:
ψ i T = ψ 1 , i f i = 1 ψ 2 , i f 1 < i 1 + | N 1 | ψ 3 , i f 1 + | N 1 | < i N
then ψ 3 ψ 2 a k ψ 1 and ψ T 1 = z T 1 as long as σ ( k ) 1 | N 2 G | + | N 3 H | and σ ( k ) 1 | N 1 | + 1 .
Proof. 
Since ψ T = z T P ( k ) , for all j N 1 S , we can get the following equation:
ψ 1 = z 1 - σ ( k ) a 1 j z 1 | N 1 | + a 1 j a k σ ( k ) | N 1 | z 2
and:
ψ j = ψ 2 = σ ( k ) z 1 + z 2 - a 1 j a k σ ( k ) z 2 + σ ( k ) | N 2 G | ( z 3 - z 2 ) , j N i G
ψ j = ψ 3 = z 3 + σ ( k ) | N 2 H | ( z 2 - z 3 ) , j N i H
From the above equations, we have that:
ψ T 1 = ψ 1 + | N 1 | ψ 2 + ( N - 1 - | N 1 | ) ψ 3 = z 1 + | N 1 | z 2 + ( N - 1 - | N 1 | ) z 3 = z T 1
For all j N 1 R , the corresponding equations similar to the above Equations (17)–(20) are holds. Since the matrix P ( k ) eliminating the first column and the first row is a symmetric matrix, we get | N 1 | | N 2 G | = ( N - 1 - | N 1 | ) | N 3 H | .
Then, we compare a k ψ 1 , ψ 2 and ψ 3 ; for all j N 1 S .
ψ 2 - a k ψ 1 = ( z 2 - a k z 1 ) [ 1 - σ ( k ) ] ( a 1 j a k + | N 1 | ) + σ ( k ) | N 2 G | ( z 3 - z 2 )
Since σ ( k ) 1 | N 1 | + 1 , σ ( k ) 1 | N 1 | + a - k . Additionally, z 3 z 2 a k z 1 , we can get that ψ 2 - a k ψ 1 0 .
ψ 3 - ψ 2 = ( z 3 - z 2 ) [ 1 - σ ( k ) ( | N 3 H | - | N 2 G | ) ] + σ ( k ) ( a 1 j a k z 2 - z 1 )
Because of σ ( k ) 1 | N 2 G | + | N 3 H | and z 3 z 2 a k z 1 , the inequation ψ 3 - ψ 2 0 holds. When j N 1 R , the calculating process is similar; the inequations ψ 2 - a k ψ 1 0 and ψ 3 - ψ 2 0 hold, too. ☐
Define that the network finally converged to x ( k ) .
x ( k ) = u Γ T x ( 0 )
where u = [ 1 , 1 , . . . , 1 ] T and Γ T = w T 1 + a k ( N - 1 ) k = 1 k 0 - 1 P ( k ) = [ Γ 1 , Γ 2 , . . . , Γ N ] . Since a > 1 , we derive that Γ N . . . Γ 2 a Γ 1 and Γ 1 + Γ 2 + . . . + Γ N = 1 . Thus, Γ 1 1 N . Therefore, the weights of the misbehaving nodes can be reduced, but the misbehaving nodes are not eliminated by the proposed scheme. Γ 2 a Γ 1 ; the effect of the misbehaving nodes becomes smaller when a becomes larger. Additionally, our scheme is especially efficient when the false nodes attack the network continuously.

4. Evaluation

This section presents numerical examples to illustrate the PACS algorithm. We validate the efficiency of PACS by comparing the consensus results without attackers and with data falsification attackers. The algorithm presented by Olfati-Saber [13] is called the Olfati algorithm here. The proposed PACS and the Olfati algorithm are compared in this section.

4.1. Experiments Setup

We get the experiment reports at an apartment in Shanghai Jiao Tong University (SJTU). We use nine USRPs (Universal Software Radio Peripherals) with a broadband antenna (70–1000 MHz) and a TVRX daughterboard (50–860-MHz receiver) to detect three channels of TV broadcasts and three relay nodes to transmit information. The nodes are deployed in a 10 m × 10 m area. Energy detection is adopted here because of its short sensing time and simplicity. Although the positions of some nodes are very close, there are big differences among the sensing reports. Table 1 shows the sensing reports of close node pairs; (5, 6) and (8, 9) could be quite different. These features illustrate that it is hard to distinguish the diversity of sensing reports caused by data falsification or not, and it is impractical to judge malicious nodes only by using a threshold. Therefore, we design a consensus secure scheme to overcome the diversity of sensing data and the unsafe factors in the network. The consensus algorithm can solve the problem of the sensing data diversity. Additionally, the adjusted parameters in the consensus algorithm can reduce the effect of uncertainties in the network.
Throughout the numerical examples, the initial sensing value (i.e., x i ( 0 ) ) is the average of 300 sensing reports for the band of 750–758 MHz. We set 10% as the initial link loss rate of each link, i.e., a i j = 0 . 90 . Then, we use the off-line data analysis to validate the efficiency of the proposed scheme. Weights for RNs are set to be γ i j = a i j / Σ j N i a i j , i I R . The algorithm is implemented with the decreasing weight sequence σ ( k ) = 1 / 10 , k 20 and σ ( k ) = 1 / ( k - 1 ) , k > 20 , and a = 5 .

4.2. Numerical Example 1

In this experiment, we select 12 sensors: nine SNs and three RNs; shown in Figure 1. Firstly, we illustrate the results with PACS. Figure 2a shows the result without attackers. The network converges to 4.9864. Then, we consider the network attacked by Node 4. The attacker executes the PDF attack and forges 16.5966 as the sensing value. Figure 2b shows the results, and the consensus value is 5.0013. Furthermore, Node 4 is set to broadcast the adjusting value with x 4 ( k ) = x 4 ( k ) + ω 4 ( k ) where ω 4 is randomly selected in [−0.5, 0.5] in the case of the IDF attack. The estimated value of the attacker may fluctuate in the data fusion process, but the network converge to 4.9543, as fast as in Figure 2c. Then we take the RDF attack into account; the attacker manipulates the sensing state value and adds Gaussian white noise to the states in each iteration step randomly. The result by PACS is demonstrated in Figure 2d. The network can converge to 5.0007 very quickly. We can see that the differences between the convergence value with attackers and without attackers are less than 0.1 (i.e., the error is less than 2%). It is considered that the proposed scheme defends against the data falsification attack effectively.
Then, considering the same attack with the above simulation, we show the simulation results with the Olfati algorithm. Figure 3a shows the result without attackers. The consensus results under three different types of attackers are shown in Figure 3b–d, respectively. We can see that the attacks make the network converge to a wrong value or even destroy the convergence of the network.

4.3. Numerical Example 2

We consider more sensors as in Figure 4. Firstly, the results of PACS are demonstrated. Figure 5a shows the results of the PACS algorithm on the network without attackers. The consensus result is 4.7543. Additionally, the convergence is quick, although there are more sensor nodes in the network. Then, we consider the case that there are three attackers executing three different attacks: the SDF, ISF and RDF attack, respectively. Figure 5b demonstrates that the value of x i ( k ) converges to 4.8561, and the difference between this value with the result without the attack is 0.1018 (i.e., the error is less than 2.14%). We can see that the scheme has a quite good resistance against the variety of data falsification attacks that exists in the network simultaneously.
Then, the results of Olfati algorithm on the network without attackers is shown in Figure 6a. The consensus speed is small, because the scale of the network is large. The consensus result is 4.7617. The same attackers are considered to execute the same types of attacks as the above. The results of the Olfati algorithm are shown as Figure 6b; the network cannot reach a consensus obviously.

5. Conclusions and Future Work

In this paper, we propose a secure scheme to reduce the destructive impact of the abnormal nodes in HWSNs. We utilize an undirected graph to represent the HWSNs and then introduce three different kinds of data falsification. A distributed detection algorithm with a local threshold is presented for classifying malicious nodes from honest ones. PACS is proposed to protect the network from the malicious nodes by decreasing their weights in the distributed estimation. The convergence property of PACS is proven to be guaranteed, and the simulation results illustrate the effectiveness and efficiency of the proposed scheme. We will study the issues of the attack under random graph topologies in heterogeneous wireless sensor networks in future work.

Acknowledgments

The work was partially supported by the State Key Laboratory of CEMEEunder Grant CEMEE2014K0102A, by the NSF of China with Grant Nos. 61221003, 61273181, 61503320 and 61290322, by Postdoctoral Science Foundation Funded Project under 2015M570235 and B2015003018 and by the Science and Technology Commission of Shanghai Municipal, China, under Grant 13QA1401900.

Author Contributions

All authors contributed to the research with their ideas, knowledge and discussion. After studying the literature, Shichao Mi proposed the idea and design of the secure scheme. Hui Han provided the network model and the attack model. Cailian Chen contributed to the analysis of the performance of the security scheme. Jing Yan and Xinping Guan contributed to the organization of the paper and performed critical revisions on an early version of the manuscript. All authors have contributed to the discussion of the proposed framework and have read and approved the final version of the manuscript.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Akyildiz, I.F.; Su, W.; Sankarasubramaniam, Y.; Cayirci, E. Wireless sensor networks: A survey. Comput. Netw. 2002, 38, 393–422. [Google Scholar] [CrossRef]
  2. Yick, J.; Mukherjee, B.; Ghosal, D. Wireless sensor network survey. Comput. Netw. 2008, 52, 2292–2330. [Google Scholar] [CrossRef]
  3. Gao, T.; Massey, T.; Selavo, L.; Chen, B.; Lorincz, K.; Shnayder, V.; Hauenstein, L.; Dabiri, F.; Jeng, J.; Chanmugam, A.; et al. The advanced health and disaster aid network: A light-weight wireless medical system for triage. IEEE Trans. Biomed. Circuits Syst. 2007, 1, 203–216. [Google Scholar] [CrossRef] [PubMed]
  4. Li, Z.; Yu, F.R.; Huang, M. A distributed consensus-based cooperative spectrum-sensing scheme in cognitive radios. IEEE Trans. Veh. Technol. 2010, 59, 383–393. [Google Scholar]
  5. Buratti, C.; Conti, A.; Dardari, D.; Verdone, R. An overview on wireless sensor networks technology and evolution. Sensors 2009, 9, 6869–6896. [Google Scholar] [CrossRef] [PubMed]
  6. Xu, K.; Hassanein, H.; Takahara, G.; Wang, Q. Relay Node Deployment Strategies in Heterogeneous Wireless Sensor Networks. IEEE Trans. Mob. Comput. 2009, 9, 145–159. [Google Scholar]
  7. Cheng, X.; Du, D.; Wang, L.; Xu, B. Relay sensor placement in wireless sensor networks. Wirel. Netw. 2008, 14, 347–355. [Google Scholar] [CrossRef]
  8. Zhu, S.; Chen, C.; Guan, X. Consensus protocol for heterogeneous multi-agent systems: A Markov chain approach. Chin. Phys. B 2013, 22, 018901:1–018901:5. [Google Scholar] [CrossRef]
  9. Zhu, S.; Chen, C.; Guan, X. Distributed optimal consensus filter for target tracking in heterogeneous sensor networks. IEEE Trans. Cybern. 2013, 42, 1963–1976. [Google Scholar] [CrossRef] [PubMed]
  10. Khan, U.A.; Kar, S.; Moura, J.M.F. Distributed sensor localization in random environments using minimal number of anchor nodes. IEEE Trans. Signal Process. 2009, 57, 2000–2016. [Google Scholar] [CrossRef]
  11. Wei, X.; Li, C.; Zhou, L.; Zhao, L. Distributed Density Estimation Based on a Mixture of Factor Analyzers in a Sensor Network. Sensors 2015, 15, 19047–19068. [Google Scholar] [CrossRef] [PubMed]
  12. Barbarossa, S.; Scutari, G. Decentralized maximum-likelihood estimation for sensor networks composed of nonlinearly coupled dynamical systems. IEEE Trans. Signal Process. 2007, 55, 3456–3470. [Google Scholar] [CrossRef]
  13. Olfati-Saber, R.; Fax, J.A.; Murray, R.M. Consensus and cooperation in networked multi-agent systems. IEEE Proc. 2007, 95, 215–233. [Google Scholar] [CrossRef]
  14. Olfati-Saber, R. Flocking for multi-agent dynamic system: Algorithms and theory. IEEE Trans. Autom. Control 2006, 51, 401–420. [Google Scholar] [CrossRef]
  15. Mi, S.; Zhu, S.; Chen, C.; Guan, X. TWGS: A Tree Decomposition Based Indoor Pursuit-Evasion Game for Robotic Networks. In Proceedings of the 13th IFAC Symposium on Large Scale Complex Systems: Theory and Applications, Shanghai, China, 7–10 July 2013; pp. 135–140.
  16. Chen, C.; Zhu, S.; Guan, X.; Shen, X. Wireless Sensor Networks: Distributed Consensus Estimation; Springer: Berlin, Germany, 2014. [Google Scholar]
  17. Wang, Y.; Attebury, G.; Ramamurthy, B. A Survey of Security Issues In Wireless Sensor Networks. IEEE Commun. Surv. Tutor. 2006, 8, 1–23. [Google Scholar] [CrossRef]
  18. Pathan, A.K.; Lee, H.; Hong, C.S. Security in wireless sensor networks: Issues and challenges. In Proceedings of the 8th International Conference Advanced Communication Technology (ICACT’06), Phoenix Park, UK, 20–22 February 2006; pp. 1043–1048.
  19. Liu, Y.; Ning, P.; Reiter, M. False data injection attacks against state estimation in electric power grids. ACM Trans. Inf. Syst. Secur. 2011, 14, 21–32. [Google Scholar] [CrossRef]
  20. Yan, Q.; Li, M.; Jiang, T.; Lou, W.; Thomas Hou, Y. Vulnerability and protection for distributed consensus-based spectrum sensing in cognitive radio networks. In Proceedings of the International Conference on Computer Communications(INFOCOM’12), Orlando, FL, USA, 25–30 March 2012; pp. 900–908.
  21. Mo, Y.; Kim, T.H.-J.; Brancik, K.; Dickinson, D.; Lee, H.; Perrig, A.; Sinopoli, B. Cyberphysical security of a smart grid infrastructure. IEEE Proc. 2012, 100, 195–209. [Google Scholar]
  22. Pasqualetti, F.; Bicchi, A.; Bullo, F. Consensus computation in unreliable networks: A system theoretic approach. IEEE Trans. Autom. Control 2012, 57, 90–104. [Google Scholar] [CrossRef]
  23. LeBlanc, H.J.; Zhang, H.; Koutsoukos, X.; Sundaram, S. Resilient asymptotic consensus in robust networks. IEEE J. Sel. Areas Commun. 2013, 31, 766–781. [Google Scholar] [CrossRef]
  24. Lu, K.; Qian, Y.; Guizani, M.; Chen, H.H. A framework for a distributed key management scheme in heterogeneous wireless sensor networks. IEEE Trans. Wirel. Commun. 2008, 7, 639–647. [Google Scholar]
  25. Du, X.; Xiao, Y.; Mohsen, G.; Chen, H. An effective key management scheme for heterogeneous sensor networks. Ad Hoc Netw. 2007, 5, 24–34. [Google Scholar] [CrossRef]
  26. Kumar, P.; Mika, Y.; Gurtoy, A.; Lee, S.-G.; Lee, H.-J. An Efficient and Adaptive Mutual Authentication Framework for Heterogeneous Wireless Sensor Network-Based Applications. Sensors 2014, 14, 2723–2755. [Google Scholar] [CrossRef] [PubMed]
  27. Mi, S.; Han, H.; Zhu, S.; Chen, C.; Yang, B.; Guan, X. A Secure Distributed Consensus Scheme for Wireless Sensor Networks Against Data Falsification. In Proceedings of the 11th World Congress on Intelligent Controland Automation (WCICA), Shenyang, China, 29 June–4 July 2014; pp. 3025–3030.
  28. Liu, S.; Zhu, H.; Li, S.; Li, X.; Chen, C.; Guan, X. An adaptive deviation-tolerant secure scheme for distributed cooperative spectrum Sensing. In Proceedings of the Global Communications Conference (GLOBECOM’12), Anaheim, CA, USA, 3–7 December 2012; pp. 603–608.
  29. Horn, R.A.; Johnson, C.R. Matrix Analysis; Cambridge Univercity Press: Cambridge, UK, 1985. [Google Scholar]
Figure 1. A network with eight honest sensor nodes, three relay nodes and one attacker.
Figure 1. A network with eight honest sensor nodes, three relay nodes and one attacker.
Sensors 16 00252 g001
Figure 2. Convergence of parameter adjusted-based consensus (PACS): (a) without attackers; (b) with one Perception Data Falsification (PDF) attacker; (c) with one Iteration Data Falsification (IDF) attacker; (d) with one Random Data Falsification (RDF) attacker.
Figure 2. Convergence of parameter adjusted-based consensus (PACS): (a) without attackers; (b) with one Perception Data Falsification (PDF) attacker; (c) with one Iteration Data Falsification (IDF) attacker; (d) with one Random Data Falsification (RDF) attacker.
Sensors 16 00252 g002aSensors 16 00252 g002b
Figure 3. Convergence of the Olfati algorithm: (a) without attackers; (b) with one SDF attacker; (c) with one IDF attacker; (d) with one RDF attacker.
Figure 3. Convergence of the Olfati algorithm: (a) without attackers; (b) with one SDF attacker; (c) with one IDF attacker; (d) with one RDF attacker.
Sensors 16 00252 g003aSensors 16 00252 g003b
Figure 4. A network with 27 honest sensor nodes, 13 relay nodes and three attackers.
Figure 4. A network with 27 honest sensor nodes, 13 relay nodes and three attackers.
Sensors 16 00252 g004
Figure 5. Convergence of PACS in numerical Example 2: (a) without attackers; (b) with three attackers.
Figure 5. Convergence of PACS in numerical Example 2: (a) without attackers; (b) with three attackers.
Sensors 16 00252 g005aSensors 16 00252 g005b
Figure 6. Convergence of Olfati in numerical example 2: (a) without attackers; (b) with three attackers.
Figure 6. Convergence of Olfati in numerical example 2: (a) without attackers; (b) with three attackers.
Sensors 16 00252 g006aSensors 16 00252 g006b
Table 1. The sensing reports of sensor nodes (5, 6, 8, 9).
Table 1. The sensing reports of sensor nodes (5, 6, 8, 9).
Region662–670 MHZ750–758 MHZ798–806 MHZ
53.36268.47914.1553
66.59661.99738.2043
83.89234.24895.0492
92.87138.71583.9781

Share and Cite

MDPI and ACS Style

Mi, S.; Han, H.; Chen, C.; Yan, J.; Guan, X. A Secure Scheme for Distributed Consensus Estimation against Data Falsification in Heterogeneous Wireless Sensor Networks. Sensors 2016, 16, 252. https://doi.org/10.3390/s16020252

AMA Style

Mi S, Han H, Chen C, Yan J, Guan X. A Secure Scheme for Distributed Consensus Estimation against Data Falsification in Heterogeneous Wireless Sensor Networks. Sensors. 2016; 16(2):252. https://doi.org/10.3390/s16020252

Chicago/Turabian Style

Mi, Shichao, Hui Han, Cailian Chen, Jian Yan, and Xinping Guan. 2016. "A Secure Scheme for Distributed Consensus Estimation against Data Falsification in Heterogeneous Wireless Sensor Networks" Sensors 16, no. 2: 252. https://doi.org/10.3390/s16020252

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop