False Data Filtering Strategy in Wireless Sensor Network Based on Neighbor Node Monitoring
نویسندگان
چکیده
منابع مشابه
Node Legitimacy Based False Data Filtering Scheme in Wireless Sensor Networks
----------------------------------------------------------------------ABSTRACT----------------------------------------------------------False data injection attack is a serious threat to wireless sensor network. In this paper, a node legitimacy based false data filtering scheme (NLFS) is proposed. NLFS verifies not only message authentication codes (MACs) contains in reports, but also the legit...
متن کاملNode Placement Strategy in Wireless Sensor Network
Wireless sensor network (WSN) have become one of the most promising technology in sensing application environment. WSNs environment are able to provide a flexible deployment and maintenance of sensor networks. The sensor nodes can be deployed in highly dynamic environments and hence enable sensor networks to be potentially used in a wide range environment including military applications, securi...
متن کاملEnergy optimization based on routing protocols in wireless sensor network
Considering the great significant role that routing protocols play in transfer rate and choosing the optimum path for exchange of data packages, and further in the amount of consumed energy in the routing protocol, the present study has focused on developing an efficient compound energy algorithm based on cluster structure which is called active node with cluster structure. The purpose of this ...
متن کاملNeighbor-Based Malicious Node Detection in Wireless Sensor Networks
The primary function of wireless sensor networks is to gather sensor data from the monitored area. Due to faults or malicious nodes, however, the sensor data collected or reported might be wrong. Hence it is important to detect events in the presence of wrong sensor readings and misleading reports. In this paper, we present a neighbor-based malicious node detection scheme for wireless sensor ne...
متن کاملFiltering Injected False Data in Wireless Sensor Network Using Bandwidth Efficient Cooperative Authentication Scheme
www.ijeist.in Abstract— Wireless sensor networks are usually deployed at unattended or hostile environments. Therefore, they are very vulnerable to various security attacks, such as selective forwarding, wormholes, and Sybil attacks. In addition, wireless sensor networks may also suffer from Injecting false data attack. For an injecting false data attack, an adversary first compromises several ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Online Engineering (iJOE)
سال: 2017
ISSN: 1861-2121,1868-1646
DOI: 10.3991/ijoe.v13i03.6869