Abstract
Introduction
Wireless sensor networks (WSNs) are widely used to monitor environments in many applications such as forest fire monitoring or military surveillance, it is a common view that WSN will play a vital role in Internet of Things (IOT) or next generation network. However, in most cases, sensor nodes in WSN are deployed in remote wild areas or even hostile environments in an unattended manner, with restrict limited battery power, communication capability, and computation capability.1,2 The adversary may capture some sensor nodes physically, acquire the secret information stored in these nodes, and take full control of these compromised nodes. Even worse, these compromised nodes are leveraged by the adversary to launch many kinds of insider attacks such as false data injection attack, 3 data dropping attack, or selective forwarding attack. Without identifying compromised nodes, they may continuously attack sensor system and waste precious limited resources of the network. Compromised nodes detection is of great importance for ensuring the security of WSN.
However, as we discussed in next related works section, most proposed filtering schemes could filter false data injected by compromised nodes, but these filtering schemes cannot detect compromised nodes. Similarly, most proposed compromised node detection (CND) mechanisms are not technically mature to be applied into WSN. Moreover, the filtering scheme itself may become the attack target of compromised nodes. In Statistical En-route Filtering (SEF), the compromised nodes could take use of the filtering scheme to launch Fictitious False data Dropping (FFD) attack, the FFD attack is described as a compromised relay node on route dropt a legitimate data report and declares it is a false data. The detection of this FFD attack is difficult, since the monitor node may lack of the key to distinguish it is a normal false data dropping or an FFD attack of compromised nodes? To our knowledge, the FFD attack of compromised nodes is not disused in any existing literatures, it is obviously a security hole of existing en-route filtering scheme, and it motivated us to design a scheme to address this security issue as described in this article.
In this article, we focus on addressing this FFD attack, and other attack forms of compromised nodes are beyond the scope of this article. Based on the analysis of FFD attack, we found that the false data dropping scenario provides us with a perfect opportunity to trap compromised nodes, and this led us to design an Active Detection of compromised nodes based on En-route Trap (ADET). In ADET, all compromised nodes possessing indicated key within one-hop range are trapped where a false data dropping is reported, and a trust model is incorporated in the en-route trap to differentiate normal nodes and compromised nodes.
In this article, the data transferring and false data filtering scheme of our ADET are developed based on SEF; the motivation behind our design relying on SEF is an initial study to filtering false data. After that, many other research works based on SEF such as Grouping-based Resilient Statistical En-route Filtering (GRSEF) scheme and Location-Based Resilient Security (LBRS) solution are proposed and described in Yu and Li 4 and Yang et al. 5 In the experiment section, we compared our ADET with SEF in aspects such as packet accuracy and energy efficiency.
The main contributions of this work are listed as follows:
An active en-route trap scheme is designed to trap compromised nodes in case of a false data dropping.
A trust model is used to evaluate trust level of neighbor nodes with respect to their authentication behaviors.
A detecting algorithm of compromised node is used to detect compromised nodes.
Related works
In recent years, many research works which focus on addressing the security issues caused by compromised nodes are proposed and described as follows.
Once the sensor nodes are compromised, they can launch false data injection attack. Thus, several en-route filtering schemes3–6 have been proposed to drop the false data en-route before they reach the sink. These filtering schemes could filter false data efficiently; however, they are not able to detect compromised nodes.
In recent years, some CND schemes are proposed as following. Ye et al. 7 propose a probabilistic nested marking scheme to locate colluding compromised nodes in false data injection attacks. Zhang et al. 8 propose the COmpromised nOde Locator (COOL) system which is an intrusion detection system that detects the compromised nodes using the relationship between incoming and outgoing messages. In Xu et al., 9 CND scheme is proposed to detect compromised nodes in WSN; it uses common application features and adjusts detection behavior when there are no periodic transmissions or lack of communications between nodes networks. Moreover, several software-based attestation schemes10,11 for node compromise detection in sensor networks also have been proposed. However, they are not readily applied into regular sensor networks due to several limitations. Yang et al. 12 present two distributed schemes toward making software-based attestation more practical; neighbors of a suspicious node collaborate in the attestation process to make a joint decision. In Lin, 13 a Couple-bAsed node compromise deTection (CAT) is proposed to early detect compromised nodes using node couples; it is the first attempt to detect compromised node in the first stage. In Al-Riyami et al., 14 an Adaptive Early Node Compromise Detection Scheme (AdaptENCD) for Hierarchical WSNs is proposed to early detect compromised nodes; this scheme is an enhanced version of CAT. To achieve a low false positive ratio in the presence of various levels of message loss ratios, two ideas are used in the design. The first is to use cluster-based collective decision-making to detect node compromises. The second is to dynamically adjust the rate of notification message transmissions in response to the message loss ratio in the sender’s neighborhood. However, both CAT and AdaptENCD are designed to detect compromised nodes in the first stage; they are not designed to defend attacks of compromised nodes in the data transferring stage. In Iqbal et al., 15 a weighted fusion scheme is proposed to locate and disregard the information from compromised sensors in a WSN; however, it does not figure out how to detect compromised nodes. In Neggazi et al., 16 a novel silent self-stabilizing algorithm for computing a minimal edge-monitoring set in sensor network is proposed; monitoring nodes can detect any malicious actions such as delaying, dropping, modifying, or even fabricated packets, but the details of the detection of malicious actions are not mentioned in the article. In Remesh Babu Raman, 17 a hybrid double layered security strategy for sensed data is proposed: the first step of security is applied by appending a Keyed Message Authentication Code (HMAC) to the sensed data by Secure Hash Algorithm (SHA-2/512), and the second step of security is implemented by a modified form of Constrained Random Perturbation-based Pairwise keY (CARPY+) mechanism; however, the communication between neighbor nodes is based on a pairwise key channel which is not energy efficient. In Zhang et al., 18 an application independent framework for accurately identifying compromised sensor nodes is proposed. The framework provides an appropriate abstraction of application-specific detection mechanisms and models the unique properties of sensor networks. Based on the framework, an alert reasoning algorithm is used to identify compromised nodes. In Ho et al., 19 a zone-based node compromise detection and revocation scheme in WSNs is proposed. The main idea behind this scheme is to use sequential hypothesis testing to detect suspect regions in which compromised nodes are likely placed. In these suspect regions, the network operator performs software attestation against sensor nodes, leading to the detection and revocation of the compromised nodes.
All above proposed schemes aim to detect compromised nodes in WSN. However, some schemes have corresponding limitations or based on assumptions, and some schemes involve too much extra communication which means they introduce unnecessary overhead. More important is that all detection schemes as mentioned above belong to passive mode; this motivates us to introduce our ADET which is an active scheme to trap compromised nodes.
Foundation technologies
SEF
In this section, we briefly describe the two foundation technologies that we borrowed to design our ADET, which are classical SEF scheme and Pervasive Trust Model (PTM).
In our design, we build the proposed ADET scheme on the framework of statistical en-route filtering of injected false data (SEF). In SEF, a global key pool is divided into

Example of a global key pool with
Once a stimulus is detected by multiple sensors, each of the detecting sensors reports its sensed signal density and one of them is elected as the Center-of-Stimulus (CoS). The CoS collects and summarizes all the received detection results, and produces a synthesized report on behalf of the group. The report which is attached with
where
The filtering algorithm in SEF as described in Figure 2 is used to filter the false data report.

Filtering algorithm of false data report in SEF.
Trust model
In this section, we briefly describe the trust model of PTM 20 which is used in our ADET to differentiate normal nodes and compromised nodes in case of a false data dropping.
This PTM has the feature of low communication, computation, and storage overhead. Furthermore, the trust evaluation of PTM also has the feature of decrease-fast-and-increase-slow which is suitable for our ADET. It is used in our ADET to evaluate the trust levels of neighbor nodes with respect to their behaviors. However, the recommendation trust is not considered for overhead consideration. The following formula is used to calculate new trust evaluation
where the range of
System models and design goal
In this section, we formulate the network model, the threat model, and identify the design goal.
Network model
Many sensor nodes are deployed on a vast geographic area. The sensor nodes are randomly distributed and dense enough so that each stimulus can be detected by multiple nodes. Each node knows its location with a localization system or Global Positioning System (GPS). Each node is assigned with a unique
The sink is a data collection center with sufficient computation and storage capabilities, and it is equipped with tamper-resistant hardware. It serves as the final goal-keeper for the system. When it receives an event report, it can verify all the
Threat model
We assume that the adversary can compromise multiple sensor nodes, obtain the security information embedded in these nodes, and take full control of them. However, the attacker cannot compromise the sink which is well-secured.
In this article, we focus on addressing the FFD attack; the en-route trap scheme is designed to trap compromised nodes in case of false data dropping. Other attack patterns of compromised nodes such as report tampering attack or collusion attack which means the monitor node may also be compromised are beyond the scope of this article, and we leave them to future works.
We also assume the compromised node adopt an “on and off” pattern to launch attack; a compromised node has the probability of
Design goal
For a sensor network with above settings and models, our design goal is to detect compromised nodes which launching the FFD attack and exclude them from the network. The proposed scheme meets the following requirements:
The scheme can address FFD attack at relay nodes and simultaneously filter false data on route.
The scheme can detect compromised nodes with a low false positive rate.
The scheme introduces low extra energy overhead and storage overhead to existing routing algorithm.
The main goal of our design is to detect compromised node with low false positive rate which launching the FFD attack; other forms of attack from compromised nodes are beyond the scope of this article. To avoid unnecessary energy consumption and prolonged network life, the communications needed to detect the FFD attack and confirm the compromised node should be strictly limited to local one-hop range.
ADET
System architecture
The ADET is designed to building a pure distributed compromised nodes detection system with low energy overhead; each node runs ADET independently and continuously monitoring data report forwarding of neighbor nodes, recording positive or negative behavior of corresponding nodes in case of false data dropping. With the accumulation of negative behaviors, once the trust evaluation falls below a system predefined threshold, a detection algorithm of compromised node is used to detect compromised node. Each node made its own decision relying on its own observations independently. The work process of ADET is described in Figure 3.

Work process of ADET.
En-route trap module
The en-route trap module is responsible for authenticating the legitimacy of the false data dropping and actively trapping compromised nodes. The formally definition of FFD attack is described as follows.
Definition of FFD attack
An FFD attack is defined as a legitimate data report is dropt by next relay node, and the relay node declares it dropt a false data report with an incorrect
In case of an FFD attack, once after
Trust module
The trust module is responsible for evaluating the trust level of neighbor nodes relying on the inputs from en-route trap module. The PTM trust model
20
which is used in our ADET has the feature of decrease-fast-and-increase-slow, and it means a negative behavior’s weight is bigger than a positive behavior. With the accumulation of negative behaviors, the suspicious compromised node’s trust evaluation will decrease rapidly, once it falls below a system predefined threshold value
CND module
The CND module is responsible for detecting the compromised nodes. In our ADET, a detection algorithm of compromised node is used to detect a compromised node, we believe the detection of a compromised node need joint work of neighbor nodes, otherwise the slander attacking to each other between normal nodes and compromised nodes will introduce unnecessary false positive rate.
Similarly, we believe the compromised nodes do not have the motive for taking use of this detection algorithm to directly attack normal nodes. The reason relies on that, if the normal nodes are falsely detected and isolated from network, these compromised nodes will lose the targets of attack, and even the compromised nodes themselves may be isolated indirectly. In fact, a smart compromised node prefers to launch attack by taking use of neighboring normal nodes, just as the attack pattern of what we described in the FFD attack, this is also the motive we proposed ADET. The details of the CND algorithm are described in Figure 4.

Detection algorithm of compromised node in ADET.
En-route trap
Description of en-route trap
The en-route trap scheme is designed to trap compromised nodes in case of a false data dropping. When
After
If all replies of corresponding neighbor nodes fall into one group, then
The scenarios of a legitimate false data dropping and an FFD attack as described in Figures 5 and 6 are used to interpret how our en-route trap scheme works.

A normal node reports a legitimate false data dropping.

A compromised node launches an FFD attack.
Legitimate false data dropping scenario
In Figure 5, a normal node
Of course, these two compromised nodes can also choose to honestly reply with “YES” to conceal themselves, then all nodes including
FFD attack scenario
In Figure 6, a compromised node
Of course, these two compromised nodes can choose to honestly reply with “NO” to conceal themselves, then, at least
Collusion attack scenario
Another scenario is when a compromised node is forced to verify an
Summary of en-route trap
In summary, our en-route trap scheme cannot directly detect FFD attack. However, it may still work to trap compromised nodes in most scenarios of false data dropping. No matter how the compromised nodes choose to reply, honestly or dishonestly? The en-route trap scheme can provide us with a perfect opportunity to trap compromised nodes. Nodes from one group will treat nodes in the other group as suspicious compromised nodes, and with the accumulation of negative behaviors, normal nodes and compromised nodes are differentiated.
In the simulation experiment, the compromised nodes are set to have the probability of 50% to reply to the question honestly and the other 50% dishonestly. The attacking to each other of nodes in different groups will led to an interesting phenomenon which is named by “shutter island” in this article; we will explain this in section “Shutter island.”
The work process of en-route trap is described in Figure 7.

Work process of en-route trap.
Performance evaluation of en-route trap
In this section, we briefly quantify the detection power of our ADET in an FFD attack scenario. Once a compromised node launched an FFD attack as showed in Figure 8, at least the compromised node

An FFD attack of
Suppose
where
Theorem
Suppose each key is uniformly assigned to all nodes before deployment, and the distribution of nodes follows the Poisson distribution in a circle sensor network, then the probability of successful detection of FFD attack can be denoted as
where
Proof
As we supposed, each key is uniformly assigned to all nodes before deployment; thus, the total number of normal nodes which possess the indicated key can be denoted as
Figure 9 shows the upper and lower limits of the common area of two neighbor nodes. Let

Minimum and maximum common area of two neighbor nodes.
As we supposed the distribution of nodes follows the Poisson distribution, thus the upper and lower limits of
The performance evaluation of detection power of en-route trap will be simulated in the simulation experiment.
Shutter island
According to our en-route trap scheme, compromised nodes and normal nodes always prefer to slander attack each other, and with the work of en-route trap, normal nodes and compromised nodes are differentiated. However, normal nodes could compensate their trust evaluation of each other through positive behaviors which is defined by replying to the question honestly, while compromised nodes cannot compensate their trust evaluation since they adopt a “on and off” strategy to reply to the question honestly or dishonestly. With the accumulation of negative behaviors and the work of our trust model, compromised nodes will be detected and isolated gradually. In some local areas, the relative shorter routes to sink are cut off due to the isolation of compromised nodes, notice that GEAR routing algorithm is adopted in the experiment of our ADET; thus, latter data reports must search another route to bypass these areas. The routing price of nodes within these areas is increased, and it also means nodes within these areas have less opportunity to participate forwarding data reports. These areas together with areas at edge of sensor network form shutter islands. In some extent, shutter islands protected rest undetected compromised nodes within it from being detected, since nodes within shutter islands have less opportunity to participate forwarding data reports. Our simulation experiment results testified to the existence of shutter islands.
ADET scheme overview
The proposed ADET scheme follows the general en-route filtering framework as described in SEF. 3 It consists of five phases. In the following content of this section, we briefly introduce these phases.
Pre-deployment phase
Before deployment, each node is assigned with a unique
Bootstrapping phase
During the bootstrapping phase, each sensor node broadcasts a hello message to its neighbors within communication range. Once received the ACK message, the neighbor relationship between two nodes is established. Each node acquires the
Robust report endorsement phase
When an event occurs, all detecting nodes are organized into a cluster and reach an agreement on the event
where || denotes the stream concatenation and
where
To facilitate the authenticating of false data dropping, before a data report is sent out or forwarded by a node, the data report will be copied and stored for a predefined period
En-route filtering phase
Once a node received a data report, the SEF scheme is used to filter false data reports as described in Figure 2, once a false data dropping is reported by a forwarding node. The en-route trap scheme together with the trust model and CND scheme will work together to detect compromised nodes as described in former sections.
Sink verification
Once the sink receives a report, it can verify the correctness of every
Energy consumption and storage overhead
Energy consumption
Compared with SEF, the extra energy consumption of ADET comes from three sources as listed below:
The first is the communication overhead of key indexes exchange between neighbors in the bootstrapping phase.
The second is the communication overhead between neighbors and computation overhead of trust model in the en-route trap.
The third is the communication overhead between neighbors in the CND algorithm.
As the research study
21
pointed out, the energy consumption of
The key indexes exchange between neighbors could be incorporated in the neighbor discover process of SEF; thus, the first source of extra energy consumption is negligible. The communication overhead between neighbors in the en-route trap and CND algorithm is negligible compared with data reports forwarding; thus, the energy consumption of second source and third source is tolerable.
In fact, the main source of energy consumption in sensor network comes from the data reports transmitting and receiving; our ADET scheme requires no additional field in the data report compared with SEF. In summary, the extra necessary energy consumption involved in our ADET is affordable, since our ADET could detect and isolate compromised nodes effectively. The simulation results verified this.
Storage overhead
Compared with SEF, the extra storage overhead of each node in ADET comes from two sources as listed below:
The first is the storage overhead to store each neighbor’s
The second is the storage overhead to store each neighbor’s trust evaluation, number of negative behaviors, and number of positive behaviors in the trust model.
In SEF, each node needs to store
Accordingly, the mathematical expectation of extra storage of each node can be denoted as
where
In the simulation experiment, we set
In summary, in ADET, each node incurs about 0.156 KB extra storage overhead compared with SEF, considering that ADET can detect compromise nodes, such extra storage overhead is tolerable. Current mainstream sensor nodes can meet the requirements of ADET (e.g. the MICA2 platform is equipped with 4 KB SRAM and 128 KB ROM).
Simulation experiment and discussion
The main goal of our ADET is to detect and isolate compromised nodes with low false positive rate. Another goal is that we prefer a lightweight scheme to detect the compromised nodes, which means our ADET does not introduce too much extra energy consumption and storage overhead. To test and develop our design, we could have used one of the several powerful simulators such as ns-2 or Opnet; all of them are well-known for having appropriate libraries for wireless networks. However, we developed a custom-made simulator in Java with a simplified network model because a controlled design of the network allows us to observe and analyze the effects of the design choices isolated from the interactions of physical, multi-access, and routing protocols.
Metrics
To evaluate the performance of ADET, we use the following metrics.
Detection power of en-route trap
The detection power of en-route trap is defined as the ratio of number of detected FFD attacks to total number of FFD attacks; note that a successful detection of FFD attack is defined as the compromised node which launch this attack is recorded a negative behavior by any normal nodes, and it is the main metric to evaluate the effectiveness of our en-route trap scheme. The detection power is supposed to vary between the upper and lower limits of theoretical value as described in former analysis.
Packet accuracy
This metric is defined by the formula as follows
where
Average residual energy level of normal nodes
The average residual energy level of normal nodes is the main metric to evaluate the energy efficiency of our ADET. We compare our ADET with SEF by this metric. As we analyzed in the energy consumption section, this metric of our ADET is supposed to remain at a little lower level compared to SEF.
Detection rate and false positive rate
The detection rate and false positive rate of compromised nodes are main metrics to evaluate the effectiveness of our ADET in detecting compromised nodes. The detection rate is supposed to increase gradually and the false positive rate is supposed to remain at a low level.
Average routing price of nodes
As we mentioned in the network model, the GEAR routing algorithm is adopted in our experiment, routing price is the main consideration to pick up next relay node. The average routing price of undetected compromised nodes is used to testify the existence of shutter islands as we mentioned in former section. It also figures out the reason of why some compromised nodes remain undetected.
Settings of parameters
Settings of T, n, m , and k
Settings of
,
, and
Simulation settings
In our simulation, 1200 nodes are distributed randomly in a circle area with a radius of 10 m, while sink locates at center of circle as described in Figure 15, each node has the same sensing range and communication range of 1 m, each node is assigned with a unique
The simulation experiment is carried out in 50 rounds; 12,000 events are simulated at random location within the network range at each round. All data reports will be forwarded to sink as described in our ADET scheme, and with the joint work of en-route trap, trust model, and detection algorithm of compromised nodes, compromised nodes are detected and isolated. It is worth to mention that our ADET scheme is independent of routing algorithm, while the GEAR routing algorithm is used in the simulation experiment.
Simulation results
Detection power of en-route trap
It is shown in Figure 10 that the detection power of en-route trap in detecting FFD attack varies between the theoretical upper limit and lower limit as analyzed in section “Performance evaluation of en-route trap,” it testified to the effectiveness of our en-route trap in detecting FFD attack.

Detection rate of en-route trap.
Packet accuracy
This section of simulation experiment compares ADET with SEF by packet accuracy. It is showed that at the beginning of simulation, both schemes have the same packet accuracy, with the experiments carried out round by round, the packet accuracy of ADET increases rapidly and reaches to 86%, while the packet accuracy of SEF remains at the same low level since it cannot detect and isolate compromised nodes. However, not all compromised nodes are detected in the experiment since the existence of shutter islands, it also explains the packet accuracy cannot rise to 100%. We leave the detection of compromised nodes in shutter islands to future works (Figure 11).

Comparison of ADET with SEF in packet accuracy.
Average residual energy level of normal nodes
This section of simulation experiment compares two schemes by average residual energy level of normal nodes, and it is showed that our ADET scheme consumes a little more extra energy compared to SEF. The additional energy consumption came from the communications between neighbor nodes in the en-route trap scheme and detection of compromised nodes (Figure 12).

Comparison of ADET with SEF in energy consumption.
Detection rate and false positive rate
Figure 13 represents the detection rate and false positive rate of compromised nodes in ADET. The detection rate of compromised nodes increases rapidly and remains at 55%, it testified to the effectiveness of our ADET in detecting compromised nodes. However, the rest 45% of total compromised nodes remain undetected. This result also proved the existence of shutter islands which protected rest undetected compromised nodes in some extent as we explained in section “Discussion.” The false positive rate of our ADET remains at 0% which means no normal nodes are falsely detected as compromised nodes.

Detection rate and false positive rate in ADET.
Average routing price of nodes
It is showed in Figure 14 that the average routing price of undetected compromised nodes increases rapidly and reaches to 7.3, while the average routing price of normal nodes remains at 6.8. This result also partially proved the existence of shutter islands.

Comparison of average routing price between undetected compromised nodes and normal nodes.
Discussion
In this section, we focus on discussing the phenomenon of almost half of the total compromised nodes remain undetected in our ADET.
With the joint work of our en-route trap scheme and trust model, more and more compromised nodes are detected and isolated as showed in Figure 13. In some local areas, the relative shorter routes to sink are cut off due to the isolation of compromised nodes; thus, latter data reports must search another route to bypass these areas. As showed in Figure 14, the routing price of undetected compromised nodes within these areas increases rapidly; it also means compromised nodes within these areas have less opportunity to participate forwarding data reports. These areas together with areas at edge of sensor network form shutter islands; these shutter islands protected rest undetected compromised nodes from being detected in some extent. However, the rest undetected compromised nodes have less opportunity to attack sensor network since they locate at the edge of network.
The distribution of nodes at the beginning of experiment as showed in Figure 15 and at the end of experiment as showed in Figure 16 also testified to the existence of shutter islands. As we can see in Figure 16, most compromised nodes locate around center of network are detected and isolated, while most undetected compromised nodes locate at the network edge or shutter islands.

The distribution of nodes at the beginning of experiment.

The distribution of nodes at the end of experiment.
Conclusion
In this article, an ADET is proposed for detecting and isolating compromised nodes in a WSN. An active en-route trap scheme is proposed to trap compromised nodes in case of a false data dropping, a trust model is used to evaluate trust level of neighbor nodes with respect to their authentication behaviors, the detection power of en-route trap is analyzed, and the results of simulation experiment testified to the effectiveness of our ADET in detecting compromised nodes with a low false positive rate. Future prospects of this research are listed as follows:
The detection of the undetected compromised nodes locating at the network edge or shutter islands.
Design more schemes to trap compromised nodes beside the FFD attack, such as normal nodes cooperate to set a trap for compromised nodes.
