Advanced Path Control Method for Filtering Secure Method in Sensor Networks
نویسندگان
چکیده
In many wireless sensor network applications, sensor nodes that have a limited battery power are deployed in open and unattended environments. Owing to these features, an adversary can compromise the deployed sensor nodes and easily inject fabricated reports into the sensor network through the compromised nodes. This attack not only depletes a limited energy resource but also gives a false alarm for deceiving base station. Recently, filtering-based secure methods have been proposed to protect sensor networks from this type of attack. In these schemes, forwarding nodes verify all event reports to detect and drop a fabricated report. To verify received event reports, sensor nodes consume a significant amount of energy. In this paper, we propose an advance path control method by using a fuzzy system. The proposed method can conserves consumption energy and reduce latency. The sufficient resilience and energy efficiency of the proposed method are shown by the simulation results.
منابع مشابه
Path Selection Method for the Statistical Filtering-Based Sensor Networks Using a Security Evaluation Function
Sungkyunkwan University, Suwon 440-740, South Korea Summary Many sensor network applications are dependent on the secure operation of sensor networks, and will have serious consequences if the network is compromised or disrupted. Fabricated reports can be injected through compromised nodes, which can lead not only to false alarms but also to the depletion of limited energy resources in battery ...
متن کاملToward an energy efficient PKC-based key management system for wireless sensor networks
Due to wireless nature and hostile environment, providing of security is a critical and vital task in wireless sensor networks (WSNs). It is known that key management is an integral part of a secure network. Unfortunately, in most of the previous methods, security is compromised in favor of reducing energy consumption. Consequently, they lack perfect resilience and are not fit for applications ...
متن کاملA Secure Routing Algorithm for Underwater Wireless Sensor Networks
Recently, underwater Wireless Sensor Networks (UWSNs) attracted the interest of many researchers and the past three decades have held the rapid progress of underwater acoustic communication. One of the major problems in UWSNs is how to transfer data from the mobile node to the base stations and choosing the optimized route for data transmission. Secure routing in UWSNs is necessary for packet d...
متن کاملA Path Selection Method for Improving the Detection Power of Statistical Filtering in Sensor Networks
In many sensor network applications, sensor nodes are deployed in unattended environments, and hence are vulnerable to physical attacks, potentially compromising the node’s cryptographic keys. False sensing reports can be injected through compromised nodes, which can lead to not only false alarms but also the depletion of limited energy resources in battery powered networks. Ye et al. [4] propo...
متن کاملUnauthenticated event detection in wireless sensor networks using sensors co-coverage
Wireless Sensor Networks (WSNs) offer inherent packet redundancy since each point within the network area is covered by more than one sensor node. This phenomenon, which is known as sensors co-coverage, is used in this paper to detect unauthenticated events. Unauthenticated event broadcasting in a WSN imposes network congestion, worsens the packet loss rate, and increases the network energy con...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2008