SIA: secure information aggregation in sensor networks
Proceedings of the 1st international conference on Embedded networked sensor systems
A dynamic en-route scheme for filtering false data injection in wireless sensor networks
Proceedings of the 3rd international conference on Embedded networked sensor systems
A probabilistic voting-based filtering scheme in wireless sensor networks
Proceedings of the 2006 international conference on Wireless communications and mobile computing
Fuzzy key dissemination limiting method for the dynamic filtering-based sensor networks
ICIC'07 Proceedings of the intelligent computing 3rd international conference on Advanced intelligent computing theories and applications
Key inheritance-based false data filtering scheme in wireless sensor networks
ICDCIT'06 Proceedings of the Third international conference on Distributed Computing and Internet Technology
Routing techniques in wireless sensor networks: a survey
IEEE Wireless Communications
IEEE Communications Magazine
Statistical en-route filtering of injected false data in sensor networks
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
Wireless sensor networks are vulnerable to false data injection attacks, because they are disseminated in hostile environments. Adversaries can inject false report into the network using compromised nodes, with the goal of deceiving the base station and draining the energy resource of forwarding node. The dynamic en-route filtering scheme (DEF) can detect and drop false date for the forwarding process. In this scheme the select of threshold value that restricts the key diffusion is important since it represents a trade-off between detection power and overhead. A large threshold value increases probability that detect false reports, but it consumes too much energy in the key diffusion phase. In this paper, we proposed adaptive key diffusion restriction method with fuzzy-based framework for DEF. A fuzzy-based system controls the adaptive threshold value of DEF through practical factors. The proposed method can provide energy saving and sufficient resilience against false data injection attacks and show simulation.