“Detection of False Injected Data in Cyber-Physical Network Systems”

Authors

  • Harshada Yadav Computer Engineering Department, MESCOE Pune India
  • Rajnandini Satav Computer Engineering Department, MESCOE Pune India
  • Akshata More Computer Engineering Department, MESCOE Pune India
  • Prof. S. R. Keshari Computer Engineering Department, MESCOE Pune India

Keywords:

Wireless Sensor Networks, Cyber Physical Network System, False Data Injection Attack, En-route Filtering, Polynomials, Bloom Filtering.

Abstract

Cyber bodily network system (CPNS) is gaining lot of interest in lots of programs like, transportation
networks, vehicular networks, existence-vital applications and plenty of greater. subsequently, the device needs to be
covered from diverse kinds of attacks that degrade the device’s performance. there are numerous one of a kind forms of
attacks which might be viable on cyber physical structures, amongst them fake records injection assault is a severe
chance to the system’s safety. in this kind of assault, the adversary compromises sensor nodes, inject fake statistics and
ship them to the controller via compromised nodes. This makes the controller to estimate wrong machine states which
results in numerous critical troubles. consequently, the false information should be filtered out earlier than it reaches the
sink. If all the fake facts glide towards the controller then it will likely be bottle neck to clear out all the fake facts and
this will paralyze the community. To resolve this issue many filtering schemes had been developed inside the beyond, all
use Message Authentication Codes (MACs) for file endorsement and En-route filtering. However, they're no longer
suitable for CPNS because of static routes and absence resilience to the wide variety of compromised nodes. therefore,
an stronger scheme has been proposed which uses polynomials in preference to MAC for document endorsement and
additionally uses bloom filtering alongside En-route filtering. for this reason, this achieves excessive resilience to the
number of compromised nodes and achieves excessive filtering performance.

Published

2019-01-25

How to Cite

Harshada Yadav, Rajnandini Satav, Akshata More, & Prof. S. R. Keshari. (2019). “Detection of False Injected Data in Cyber-Physical Network Systems”. International Journal of Advance Engineering and Research Development (IJAERD), 6(1), 5–9. Retrieved from https://ijaerd.org/index.php/IJAERD/article/view/4017