SIA: secure information aggregation in sensor networks
Proceedings of the 1st international conference on Embedded networked sensor systems
A dynamic en-route scheme for filtering false data injection in wireless sensor networks
Proceedings of the 3rd international conference on Embedded networked sensor systems
A probabilistic voting-based filtering scheme in wireless sensor networks
Proceedings of the 2006 international conference on Wireless communications and mobile computing
Statistical wormhole detection in sensor networks
ESAS'05 Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor Networks
Key inheritance-based false data filtering scheme in wireless sensor networks
ICDCIT'06 Proceedings of the Third international conference on Distributed Computing and Internet Technology
Routing techniques in wireless sensor networks: a survey
IEEE Wireless Communications
IEEE Communications Magazine
Statistical en-route filtering of injected false data in sensor networks
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
In wireless sensor networks (WSNs) individual sensor nodes are subject to security compromises. An adversary can use compromised sensor nodes to inject false reports into the WSN. If undetected, these false reports are forwarded to the base station. Such attacks by compromised sensor nodes can not only result in false alarms but also depletion of the limited amount of energy in battery powered sensor nodes. The statistical en-routing filtering (SEF) scheme can detect and drop false reports during the forwarding process. In SEF, the number of the message authentication codes (MAC length) is important for detecting false reports and saving energy in network. In this paper, we present a fuzzy-based MAC length determination method for SEF. If there are fewer nodes surrounding the occurred event in the field in the network than the MAC length, the node cannot generate a legitimate report in SEF. The fuzzy-based method can prevent this problem and provide energy savings. We evaluated the proposed method's performance via simulation.