Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Denial of Service in Sensor Networks
Computer
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
The sybil attack in sensor networks: analysis & defenses
Proceedings of the 3rd international symposium on Information processing in sensor networks
Toward resilient security in wireless sensor networks
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
Defending against false-endorsement-based dos attacks in wireless sensor networks
WiSec '08 Proceedings of the first ACM conference on Wireless network security
ICIC '08 Proceedings of the 4th international conference on Intelligent Computing: Advanced Intelligent Computing Theories and Applications - with Aspects of Theoretical and Methodological Issues
A General Framework for Adaptive Filtering in Wireless Sensor Networks Based on Fuzzy Logic
ICIC '08 Proceedings of the 4th international conference on Intelligent Computing: Advanced Intelligent Computing Theories and Applications - with Aspects of Theoretical and Methodological Issues
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication
CEA'09 Proceedings of the 3rd WSEAS international conference on Computer engineering and applications
CEA'09 Proceedings of the 3rd WSEAS international conference on Computer engineering and applications
A fuzzy-based interleaved multi-hop authentication scheme in wireless sensor networks
Journal of Parallel and Distributed Computing
Cluster adaptation method to enhance performance of filtering scheme in sensor networks
ICACT'09 Proceedings of the 11th international conference on Advanced Communication Technology - Volume 1
Fuzzy adaptive threshold determining in the key inheritance based sensor networks
IEA/AIE'07 Proceedings of the 20th international conference on Industrial, engineering, and other applications of applied intelligent systems
A fuzzy-based en-route filtering scheme in sensor networks
ICIC'07 Proceedings of the intelligent computing 3rd international conference on Advanced intelligent computing theories and applications
Fuzzy key dissemination limiting method for the dynamic filtering-based sensor networks
ICIC'07 Proceedings of the intelligent computing 3rd international conference on Advanced intelligent computing theories and applications
OTM'07 Proceedings of the 2007 OTM Confederated international conference on On the move to meaningful internet systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part I
A multi-path interleaved hop-by-hop en-route filtering scheme in wireless sensor networks
Computer Communications
ICIC'09 Proceedings of the 5th international conference on Emerging intelligent computing technology and applications
ICCSA'07 Proceedings of the 2007 international conference on Computational science and Its applications - Volume Part II
Fuzzy-based determination method for redistributing keys in sensor networks
ICACT'10 Proceedings of the 12th international conference on Advanced communication technology
Key re-dissemination for maintaining detection power in sensor networks
ICACT'10 Proceedings of the 12th international conference on Advanced communication technology
Fuzzy efficient MAC length determination method for commutative cipher based filtering
ICACT'10 Proceedings of the 12th international conference on Advanced communication technology
Hop by hop on demand path selection method for sensor networks
ICACT'10 Proceedings of the 12th international conference on Advanced communication technology
Fuzzy based key re-distribution period determination method in wireless sensor networks
ICIC'10 Proceedings of the Advanced intelligent computing theories and applications, and 6th international conference on Intelligent computing
Advanced path selection method for detection of false reports in statistical filtering based WSNs
WISA'11 Proceedings of the 12th international conference on Information Security Applications
Hi-index | 0.00 |
In this paper, we study the fabricated report with false votes attack and the false votes on real reports attack in wireless sensor networks. Since most of the existing works addresses the first attack while leaving an easy way for the attackers to launch the second attack, we propose a probabilistic voting-based filtering scheme (PVFS) to deal with both of them simultaneously. On the basis of the en-route filtering scheme, PVFS combines cluster-based organization, probabilistic key assignment, and voting methods. Through both analysis and simulation, we demonstrate that PVFS could achieve strong protection against both attacks while maintaining a sufficiently high filtering power.