False Data Filtering Strategy in Wireless Sensor Network Based on Neighbor Node Monitoring

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Node Legitimacy Based False Data Filtering Scheme in Wireless Sensor Networks

----------------------------------------------------------------------ABSTRACT----------------------------------------------------------False data injection attack is a serious threat to wireless sensor network. In this paper, a node legitimacy based false data filtering scheme (NLFS) is proposed. NLFS verifies not only message authentication codes (MACs) contains in reports, but also the legit...

متن کامل

Node Placement Strategy in Wireless Sensor Network

Wireless sensor network (WSN) have become one of the most promising technology in sensing application environment. WSNs environment are able to provide a flexible deployment and maintenance of sensor networks. The sensor nodes can be deployed in highly dynamic environments and hence enable sensor networks to be potentially used in a wide range environment including military applications, securi...

متن کامل

Energy optimization based on routing protocols in wireless sensor network

Considering the great significant role that routing protocols play in transfer rate and choosing the optimum path for exchange of data packages, and further in the amount of consumed energy in the routing protocol, the present study has focused on developing an efficient compound energy algorithm based on cluster structure which is called active node with cluster structure. The purpose of this ...

متن کامل

Neighbor-Based Malicious Node Detection in Wireless Sensor Networks

The primary function of wireless sensor networks is to gather sensor data from the monitored area. Due to faults or malicious nodes, however, the sensor data collected or reported might be wrong. Hence it is important to detect events in the presence of wrong sensor readings and misleading reports. In this paper, we present a neighbor-based malicious node detection scheme for wireless sensor ne...

متن کامل

Filtering Injected False Data in Wireless Sensor Network Using Bandwidth Efficient Cooperative Authentication Scheme

www.ijeist.in Abstract— Wireless sensor networks are usually deployed at unattended or hostile environments. Therefore, they are very vulnerable to various security attacks, such as selective forwarding, wormholes, and Sybil attacks. In addition, wireless sensor networks may also suffer from Injecting false data attack. For an injecting false data attack, an adversary first compromises several ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Online Engineering (iJOE)

سال: 2017

ISSN: 1861-2121,1868-1646

DOI: 10.3991/ijoe.v13i03.6869