SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
A probabilistic voting-based filtering scheme in wireless sensor networks
Proceedings of the 2006 international conference on Wireless communications and mobile computing
A survey of security issues in mobile ad hoc and sensor networks
IEEE Communications Surveys & Tutorials
Routing techniques in wireless sensor networks: a survey
IEEE Wireless Communications
IEEE Communications Magazine
Hi-index | 0.00 |
Sensor networks can be easily compromised by an adversary because of hostile environments. An adversary may use compromised nodes to inject false reports into the network. The dynamic en-route scheme to filter false data injection can detect and drop such false reports during the forwarding phase. In this scheme, determining between a threshold value and the period for dissemination are important, as it trades off between security power and energy consumption. Thus, we should choose a threshold value and the period for authentication key dissemination such that it provides sufficient resilience, yet is small enough to conserve energy. This paper presents determining a pair of threshold method using fuzzy logic for the dynamic en-route scheme to filter false reports in wireless sensor networks. Our proposed method can determine threshold value which is the number of message authentication code and when to disseminate new authentication keys using a fuzzy logic. We will demonstrate resilience and energy efficiency of the proposed method through the simulation result.